Friday, December 2, 2011

Lab 4.5.1 Reflection

In this lab, I learned how the netstat command works. I learned that there are several options tot he netstat command that carry out different functions. I also learned that telnet can be used to establish a connection to Eagle Server but not to UDP because Telnet is a TCP protocol and UDP cannot build a TCP session. Also, this lab was pretty straightforward, once I read the directions and understood what the question was asking. I was surprised to see that I really didn't have to use the Terminal because the data was given in the screenshots that Cisco provided. After looking at the screenshots, the lab was easy from there.

Packet Tracer Lab 5.6.1 Reflection

In this lab, we were expected to add on to the basic topology we had bee using for the first three labs. At first glance, this lab seemed very complicated and I knew for sure that I would mess up at one point and have to start over. That is why I approached this lab in a different way. In the first three labs, I jumped straight to the directions and got to work. I figured this lab would take a lot of work and so I read all the descriptions word for word and saw that this lab might not be that difficult at all. I actually did the lab twice, the first time I just wanted to see if I could do the lab and the PDU still failed and then I read over task 1 again and saw that it was supposed to fail. I supposed that the reason the PDU failed because the Eagle Server still had no functioning ports. I think Task 2 was the most difficult one of all and it required me to read the directions multiple times however I still could not get it working. I couldn't figure out why exactly though but that's probably because I still have to get used to all the features of this program and the way everything works.

CW Self-Discipline

Self discipline is applying yourself to something that you set your mind to. It could be the easiest thing in the world or the most difficult thing but it requires you to set your mind to getting it done. In our case, Cisco requires a lot of work. It's definitely one of the more difficult aspects of computers and our constantly transforming world. As Cisco says, we are a human network and as the world changes, so do our roles in the network. In order to keep up with these changes, we need to apply ourselves. It's a lot of work but the benefits are worth it. Self-discipline in this field means having the strength and will to keep going even when you're at the worst position you could be in. However, that's more general, when it comes to Cisco at ITHS, self-discipline takes on a different meaning. In school, being self-disciplined means giving your best at everything in class, whether the assignment counts or not. It means doing all your homework and actually making an attempt at completing the labs, which honestly speaking, requires determination to do. The labs are difficult and we have to do them by ourselves, but this only helps us become better people. It teaches us to be on our own and work for ourselves and that is what makes a disciplined person. When it comes to comparing Thomas Suarez to us, honestly, we are nowhere close. It takes a lot of will and determination to be creating apps at the age of 12, which is something even adults in their late 30s and 40s struggle with. It requires self-discipline, it requires you to put your work first and have your priorities straight. However, Cisco and programming both take great amounts of self-discipline because going off track can only lead to you losing your way.

Thursday, December 1, 2011

Packet Tracer Lab 4.6.1 Reflection

This lab was somewhat confusing. I wasn't sure if I should get rid of the Eagle Server and add a new one or if I should just change the configuration of Eagle Server. In the end, I decided to add a new one. One part of the lab that I like was that I got to learn the difference different cables can have on a connection. The lab was easy because the directions were straightforward.

Packet Tracer Lab 3.5.1 Reflection

I think this lab was the easiest lab so far. This is because now I feel more comfortable with using this program. Also, the directions were clear and simple and after using the Packet Tracer program for the first two labs, easy to follow. I think the part that confused me was the fact that the packet failed to go through to the Eagle Server every time I tried sending it. Then, I realized that I had to configure the IP address where ever I could and finally got it to work. The most helpful thing in this lab was the routing table that gave the gateway address, IP address and Subnet Mask. All in all, this was a very simple lab and I am happy with the results.

Wednesday, November 30, 2011

Packet Tracer Lab 2.7.1 Reflection

This lab was simple to complete but the PDU part was difficult. I could not figure out how to send the PDU properly because it kept saying it failed and would not go through to the Eagle Server. Finally, I turned the AAA port on for the Eagle Server and tried again and configured the IP addresses for the source and destination and managed to send the packet successfully. Then I tried the simulation and it was a bit confusing because I was not sure what I was doing but everything seemed to work fine and the packets were being captured and forwarded between devices successfully on the network. So basically, the lab was pretty confusing more than difficult.

Packet Tracer Lab 1.7.1 Reflection

In this lab, I learned how to create a network in Packet Tracer. At first, it was very difficult because it was tough to navigate the program. However, once I got a basis on what to do, I knew what to do from there. The most difficult part of the lab was figuring how to connect R1-ISP to R2-Central with a Serial DTE cable. I didn't know that I had to click on the parts I needed to add and then actually add it to the routers and then configure them. After that, the network is easy to set up. Overall, this was a slightly difficult lab because I was new to the program but I am sure it will become easier as I get more used to it.

Tuesday, November 15, 2011

Progress Report

My grades improved so far this marking period. Overall, I am happy with my progress in my test scores and my lab grades. Even with my better work, I still have a 96 and that grade can still improve. I think to improve I must stop talking so much in class and finishing my work on time.

Thursday, November 3, 2011

Cisco Academy Handout 1 Assignment

1. The 16 points state Cisco's requirements for the use of the Website.
2. You allow Cisco to gather personal information from you and use it alongside Cisco's privacy policy.
3. You cannot post any information that can be deemed vulgar or harmful to others.
4. Unless you are in the Forums & Chat features you cannot sell anything to anyone.
5. You and you alone are responsible for the content and information that you post or give out to others.
6. Anyone Cisco appoints to moderate the content on the website has the right to remove the information and monitor the site.
7. It is an act of transgression to take credit for anything on this site and is punishable by law.
8. Cisco can and will suspend your account if you do not abide by the Terms & Conditions.
9. There are no warranties and if you do have a warranty, it is a void.
10. Cisco will not be dependent on you in case of any damages or lost data.
11. Any conflicts relating to the Cisco site must be resolved in the court of law of the state of California.
12. Cisco can change the laws and terms & conditions of the site.
13. The services offered by this site are provided by Cisco Systems.
14. When you submit content to the website, you grant Cisco the right to republish the content.
15. Any feedback you give to Cisco will not be treated as confidential and you should not send confidential information.
16. If you have a claim for copyright infringement, you can contact Dan Scheinman.

Benefits
The benefits of successfully completing the courses are receiving certifications. You can become certified and this helps you get a job. People with CCNA certifications are taken very seriously in the Networking & IT fields and this is the largest benefit of getting certified. There is an increasing demand for highly-skilled networking professionals in our social world and if you have completed the courses, you are considered one of the best there is.

Quality Assurance Plan - It is a documentation that provides the specs, policies, procedures and processes for keeping a high quality education in the Networking Academy Program.

Industry Certifications
CCENT
CCNA
CCNP
IINS


Wednesday, October 26, 2011

What went wrong, right, and how we could have fixed it

Today was a very hectic day. My group was given the task of troubleshooting PCs and getting the old computers up and running again. In the beginning, a lot of things went wrong. The PC we got didn't have a hard drive or RAM or power supply and because of that we couldn't get that one running. Then we got a new PC with everything in it already and that made our lives so much easier because we could not find the parts for the old PC. Then we could not find a monitor, so we had to trade in a monitor for another one. In order to do so, my partner and I had to carry monitors back and forth from computer labs. When we got the new monitor, it was missing an audio plug so we had to bring it back and get another one. That was pretty much all that went wrong today. Then we just plugged the monitor and PC in and got them working. Then the final thing went wrong, there was no Internet connection because we did not have Ethernet cables to connect to the Internet. However, we were not able to fix this because we didn't have time or else we would have fixed it by finding a way to get wireless internet.

Monday, October 17, 2011

UDP and the Transport Layer

UDP is a type of protocol that stands for User Datagram Protocol. It is an integral part of the Transport Layer in the TCP/IP Model. The UDP protocol allows computer applications to send messages on an IP network. UDP is an unreliable datagram protocol and it is also connectionless. The word "unreliable" simply means that there is no possible way to confirm that the message has reached the host destination or not. Furthermore, there is no way to verify that the message reached the destination correctly or not. According to docstore.mik.ua, UDP is the most efficient protocol for the Transport Layer. The site gives the example that if the data being sent over the TCP/IP Network is small, then the overhead of making connections and assuring reliable delivery is greater than re-sending the data packet itself. As we learned in class today, Transport Layer protocols require minimum overhead and the UDP protocol gives just that and that is why it is helpful to the Transport layer.

Source: http://docstore.mik.ua/orelly/networking/tcpip/ch01_06.htm

Friday, October 14, 2011

Transport Layer Problems

Sony

Sony's main problem was security. A group of hackers hacked into Sony's Playstation Network and was able to steal the information of thousands of users including credit card information, email addresses and home addresses. The reason this monumental hacking occurred was a fault in Sony's security of the Playstation Network. There was a major lapse in security and this allowed hackers in Anonymous to infiltrate the network and steal this information. Sony responded quickly as soon as they were made aware of the hack and shut down nearly 77 million PSN users' accounts. As a precautionary measure, Sony fixed the problem and upgraded their security and then turned their heads towards the customers. Sony offered PSN users an apology and a one month of Playstation Plus+ for free, access to Qriocity for a month, two free games from a selection of five games, as well as a identity-theft program. The total cost of this event for Sony was nearly $170 million.
Sources: http://www.esecurityplanet.com/headlines/article.php/3934276/Sony-Says- PlayStation-Security-Breach-Will-Cost-170-Million.htm

http://www.quora.com/PlayStation-Network-Hacked-Outage-April-May-and-June- 2011/What-caused-Sonys-PSN-outage-in-April-2011

Blackberry

Blackberry suffered an outage in service when it's core switch at Slough data center crashed. RIM, the maker of Blackberry, is still clueless as to what caused the biggest network crash in its history. When RIM was asked about the lapse, it gave no straight answer. However, according to Pcworld.com, the real reason this lapse occurred is because RIM does not have the capacity to re-route traffic to countries that are supported by the Slough switch. Blackberry is slowly resolving the outage and the network is limping back to normal after Blackberry replaced the switch. However, Mike Lazardis apologized to the public via a YouTube video.

Sources: http://www.telegraph.co.uk/technology/blackberry/8824912/BlackBerry-services- restored-worldwide.html

http://www.pcworld.com/article/241917/rim_clueless_about_cause_of_blackberry_outage.html

Wednesday, October 5, 2011

What is DHCP and how, exactly, does it work?

DHCP stands for Dynamic Host Configuration Protocol and it is a server service. Its main purpose is to lease IP addresses to network clients. Although it's main purpose is to lease IP addresses to network clients, it also provides related IP information such as subnet masks, default getaways, and the IP address to DNS servers. DHCP works by leasing an unique IP address to a network client for a certain period of time. DHCP works through four main steps:
  1. When a network client's computer boots up, it sends out a packet called DHCPDISCOVER and this packet contains the computer name and MAC address and basically requests for a IP address from DHCP servers.
  2. DHCP servers then respond to the packet with a DHCPOFFER.
  3. Then the client computer responds with a DHCPREQUEST packet and this basically means that the client has accepted the offer and would like to lease the IP address.
  4. This is the final step of the DHCP process. The DHCP server responds with a DHCPACK message that contains all the IP information and acknowledges the acceptance of the offer.
The client computer is part of the TCP/IP network and can communicate on it now since every computer on this type of network model needs an unique IP address.

-Information paraphrased from http://www.dummies.com/how-to/content/installing-and-configuring-dhcp.html

Tuesday, October 4, 2011

Peer to Peer (P2P) & Client-Server Models

Advantages of Peer to Peer
-The advantages of peer to peer (P2P) are that information gets from the source to the destination faster. In addition, these networks are easier to setup than client-server models. There is also no need for a dedicated server since all the pieces of equipment attached to the network act as servers and clients. Also, in P2P networks, when the demand on a network increases, so does its capacity. There is also no need for network administrators on P2P networks, the network is cheap to setup and fast to run and finally, every computer in the network can make backups of its data to the other computers for security.

Disadvantages of Peer to Peer
-There are not many disadvantages to using a Peer to Peer network but the biggest one would be that it does not a support a wide range of computers. These networks are usually used for a small amount of computers usually around 10-15. Another problem is that these networks are most commonly used in applications that don't have much security such as LimeWire and FrostWire, therefore, these networks are not advisable for businesses and other large corporations. As you can see, another problem with Peer to Peer networks is the lack of security and their vulnerability. Furthermore, these networks are not centralized and therefore make network administration is virtually impossible even though it is not needed for such a small network. Finally, no computer in the network can be relied upon to keep information safe for an extended period of time.

Advantages of Client-Server
-Client-Server networks are centralized and this is one of their biggest advantages. This means that all resources and data security is controlled by a server. Another advantage is its scalability. Nearly all elements in a client-server network can be replaced with ease as the need for it increases. These networks are also very flexible and can have new pieces of technology integrated into them easily. Client-Server networks also have great accessibility and can be accessed from multiple platforms.

Disadvantages of Client-Server
-Client-Server models have a long list of advantages and a fairly short one of disadvantages. For starters, these networks can fail more often than Peer to Peer networks because they have to depend on one central server to operate the network. Client-Server networks differ from Peer to Peer networks because they can foster more people on their network. They do this by relying on one server to operate things smoothly and because so many people can be on the network can be on at once, the server can easily be overloaded and although this problem can be fixed easily, it takes time to do so. The final disadvantage to client-server networks is that they are quite expensive and difficult to set up.

Which is more centralized?
- A Client-Server Model is more centralized because it depends on one central server to run the network.

Thursday, September 22, 2011

Task 3 and 4 of Lab 2.2.5

Task 3
The purpose of trace route programs is to show the reader more about how the network works. It shows how a packet travels along the network and the path it takes to get to the destination. Another purpose of trace route programs is to help a sender or source trace the path a packet that has been sent throughout the network. The IP packets may travel on different paths because of the complexity of the network even though most IP packets take one path and one path only. Traceroute programs are programs that can be used by actual humans and machines for the sole purpose of retrieving information. The program can also be used to help test your connectivity to the network.
Task 4
Traceroute programs are very similar to Ping programs. Ping programs are often used by hackers in order to infiltrate a computer system. That is one of the few challenges and problems with having a program like Traceroute. Once a person has the IP address of the computer they want to hack, the rest is pretty simple for the best hackers. In addition to that, since Traceroute programs give more than just the IP including location, creator, and exact latitude and longitude, it makes life simple for hackers. Traceroutes program provide access to essential and integral information for hackers that they can use to hack computers of not only regular individuals but even bigger corporations. There are other security issues that could arise from using programs like NeoTrace, Ping, and Traceroute programs but the major one is the possibility of hackers having access to the most important information about a network or website.