Friday, December 2, 2011

Cisco Student Benefits

There are various benefits to being enrolled in the cisco system as a student. It gives us access to the Cisco curriculum and contents so that we will be able to use that directory to properly assist us in either cisco labs or other programming dilemmas we may encounter. Not only does it have information to offer but it also acts as an interactive blog and if you cannot find your desired information, you can ask a question to the cisco community and receive a message as a response. It is also helpful for us to receive access to job listings as well as a calendar updated with various events and of course certification testing dates, which is very crucial for our class. As a result their are many advantages to being enrolled in the cisco system.

CW Self Discipline

I have recently received an eye opening experience, it came from a video i saw, featuring twelve your old Thomas Suarez. He was able to set up his priorities at such a young age and pursued his goal of making a legitimate iphone app. His created applications included a spin on wack 'a mole involving justin beiber. As well as another application, earth fortune. His determination and motivation proved to be valuable assets as he was able to achieve success, but more importantly he accomplished his goals and gave himself an enormous boost to his self esteem. This will be a good example for the journey that the cisco course provides. Due to the fact that the cisco course may be complicated at times, Thomas Suarez's story shows us that whenever we are faced with a dilemma if we persevere we will get one step closer to achieving our goal. It promotes a vibe of determination and shows us a moral that depicts a never give up attitude.

Lab 5.6.1

In this lab we reconfigured the entire the router interface. This involved adding IP addresses as well as using the inspect tool to examine the routes, and it reveals that there is no way to reach the eagle server. It is then revealed to us that we must configure the router according to GUI. Once we adjust the routing static's mask as well as IP we save it into the Global Settings. Once we verify our information according to that that is provided to us in the lab we were encouraged to once more resume the test and repair process. By checking the results of the topology we were able to test our connectivity revealing several possible connections to the eagle server. Then once you have correctly configured the actual router you must move on to the packet, and inspect as well as adjust it to collaborate with the rest of the topology. We configure the packet using the Capture/Forward function, and then move onto sending the packet. I have yet to complete each of these steps without flaw but i still continue to pursue a steady connection

lab 4.6.1

I am still unable to get the first router to function properly when a packet is sent within my topology. In this lab we were required to explore and familiarize ourselves with the UDP and TCP protocols. We were also promoted to research the relationship between each protocol and how they function accordingly to the topology. After countless repairs and testing the router is incoherent to the rest of the topology . As a result i moved on to the desktop 1A, the lab says to open a web browser from the desktop and access the eagle server website. Once there we capture the interaction between DNS, UDP, HTTP, and TCP. This concludes lab 4.6.1 and each packet sent within my topology still brings results of failure.

Lab 3.5.1

This lab was stressful due to the fact that i could not successfully send a packet through out my network, this was a result of the first router being inactive in receiving and forwarding the packet. I was unable to make the first router assist in the process no matter how much i configured its physical, IP, and gateway settings. In this lab we were required to repair and test our topology, but although i had begun my repairs i have yet to get any successful results when testing to see if the packet can be sent within my topology. I used the CCNA contents to explore the relationship between DNS and HTTP and this concluded Lab 3.5.1.

Thursday, December 1, 2011

Lab 2.7.1 reflection

In this lab we were encouraged to experiment with different combinations of devices other than the basic one server, two routers, one switch and two pc's design. We were required to send simple pdu's between the devices in our network and then once we had completed that we move on to sending complex pdu's. Then the pdu's are analyzed in simulation mode, using the capture/forward functions to move as well as detect the packet. Once this is done we examine the entire packets journey through the event list found in the Info column. This concludes lab 2.7.1, ending the basics to sending a packet.

Wednesday, November 30, 2011

lab 1.7.1 reflection

In this lab we learned the basics of packet tracer. We were required to create a topology network consisting of two routers, a switch, a server, as well as two desktops. First we located all the devices and connected them using the auto-connect tool. Then we configure each device according to the corresponding numbers that were provided. In addition to this we experimented with the various features of packet tracer including the tutorial. Once each device was correctly setup and configured we determine if an actual packet could travel throughout the network, using a simulation. Thus concluding our introduction to packet tracer through lab 1.7.1.

Tuesday, November 15, 2011

Cisco CCNA Period 6-7 11/15/11

I believe that in this class I have improved in tests but in classwork as well as homework I have been slacking in completing my assignments both to a satisfactory degree as well as completing them on time. Overall my grade has dropped from last marking period to present, and I am motivated as well as determined to do better and raise my grade.

Thursday, November 3, 2011

ccna period 6-7 11/3/11

Point 1- You must abide by all the legal terms and conditions of cisco and may not replicate the information that you access from cisco

Point 2- You acknowledge and agree that Cisco may collect personally identifiable information from you and use such information in accordance with Cisco's then-current privacy policy, the terms and conditions of which are available here.


Point 3- In using this website you agree to not use verbal abuse and refrain from malicious behavior.


Point 4- Except for the Forums & Chat features that expressly permit Networking Academy alumni to discuss potential career opportunities, this Website is not to be used as a solicitation for business.

Point 5- You are solely responsible for the content you have on cisco, you agree that Cisco is only acting as a venue and that Cisco has no liability related to the content of any discussion board posting or any other user-created content on its Website, whether or not arising under the laws of copyright, libel, privacy, obscenity, or otherwise. 

Point 6- Information you post to our websites is not pre-screened. Cisco, or a third party organization whom Cisco may appoint to moderate and/or maintain any of the websites, each reserves the right, although it does not have the obligation, to monitor content throughout the Website and to remove any content which Cisco or such third party organization, in its sole discretion, determines to be harmful, offensive, defamatory, libelous, illegally threatening or harassing or which contains obscenity, pornography or is otherwise inflammatory; which may create liability for Cisco; or is unrelated to the intention of the Website or otherwise in violation of Cisco's policies of acceptable use.

Point 7- You should assume that everything hosted on this Website, with the exception of individual user postings, is the intellectual property of Cisco or our suppliers, all rights to this information are reserved.


Point 8- Cisco, in its sole discretion, may immediately suspend or terminate your access to the Website if you violate or otherwise fail to comply with the terms and conditions of this Acceptable Use Policy. Upon any suspension or termination, Cisco may retain or delete, in its sole discretion, any information or content that you previously provided to the Website.


Point 9- This is a cisco disclaimer

Point 10- In no way is cisco responsible for what you do as a user.

Point 11- These terms of use shall be governed in all respects by the laws of the State of California without giving effect to any conflicts of law principles that may require the application of the law of a different state or country.

Point 12- You may not cooperate with the cisco site unless you completely agree with the website usage agreement.

Point 13- The services offered by the site are property of cisco and you can sign up for daily emails.

Point 14- By submitting your content to the Website, you hereby grant to Cisco a worldwide, perpetual, irrevocable, royalty-free and fully-paid, freely transferable, right to exercise all copyright, publicity, and moral rights, in any media now known or not currently known, with respect to any content you provide to us in any public space on this Website or in any e-mail that you provide to us through this Website.

Point 15- We will treat any feedback or suggestions you provide us as non-confidential and non-proprietary, as a result you should not submit confidential or private information.


Point 16- Cisco copyright details and finalization of the usage agreement  

Tuesday, November 1, 2011

Lab 11/1/11 ccna period 6-7

In this Lab we examined the connection between the eagle server and the wireshark program. We got an in depth understanding of syn bytes as well as source to destination handshakes including acknowledgments. 

Wednesday, October 26, 2011

ccna peiod 6-7 10/26/11

I believe what went wrong in today's activity was that we had a lack of communication. We all assumed separate positions instead of working as an united body we all pursued different tasks. I think if we had some sort of guidance that the end result would be more successful. 

Monday, October 17, 2011

UDP

UDP, or User Datagram Protocol enables computer applications to send messages, or in this case referred to as datagrams. These datagrams can be sent to other hosts on an Internet Protocol network without requiring prior communications to set up special transmission or data paths. UDP is most effective in small servers that have an enormous client population. UDP is cohesive to the Transport Layer due to the fact that it is time sensitive and the UDP ensures no delay when packets are dropped. UDP is a minimal message Transport Layer Protocol, unfortunately UDP offers no guarantee to the upper layers of message delivery or retaining the state of any messages that have been sent. Examples of applications that use UDP include real time multiplayer games, voice over IP as well as streaming media

Friday, October 14, 2011

Transport Layer Problems

Playstation Network Problems
On April 17, 2011 the Playstation Network was hacked exposing the personal account information of 77 million users. This prevented users of the Playstation 3 as well as PSP from online activity. This problem lasted for approximately 23 days. Sony claimed that the playstation users data was compromised long before they were able to detect a breach. Credit Card information is encrypted over the Playstation Network, but other personal details are not and therefore were vulnerable.

The attack on the network was in accordance to the Sony servers being taken offline the previous day, and therefore the Network was susceptible to a hack. George Hotz is the alleged hacker and he was able to do this by enabling himself read and write access as well as having hypervisor level access to the processor. He used a Playstation 2 emulator which had been removed by Sony from the current console. In addition he also created a custom firmware. It requires the OtherOS function of the machine, and consists of a linux kernel model and gaining control of the systems hyperdriver via bus glitching.

Playstation 3 had a feature that would update firmware and delete the OtherOS function but this was absent from the newer, slimmer models. Due to the fact that Linux is foreign to the PS3 network it made it more difficult to resolve and remove the custom firmware. Hotz had run a "homebrew" application on his own PS3 similar to the Iphone jailbreaking technique by reviewing the jailbreak of the Iphone, Sony gained assistance in solving the problem. They also hired various experts to set up firewalls and basically abolish the custom firmware. 

Wednesday, October 5, 2011

DHCP

DHCP is an acronym for Dynamic Host Configuration Protocol, is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. DHCP eliminates the manual task by a network administrator. It also provides a central database of devices that are connected to the network and eliminates duplicate resource assignments. Other than IP information the DHCP also provides info on service hosts in general but particularly network boot servers.

Tuesday, October 4, 2011

Peer-Peer vs Client-Server

The Client-Server model is more centralized, due to the fact that all the clients revolve around one figure. In this case as more clients join the system fewer resources are available. In a client-server model your information gets channeled directly to the source/destination while in a peer-peer it has to go through each figure in the network. Some advantages of peer-peer are that it allows the pc's in the network to pool resources, as well as applications only need to be installed in one of the computers and their is no need for a dedicated server. On the other hand with a client-server model network access speeds are usually faster than those found on peer-to-peer networks, also it’s more secure because if a client wants to communicate with another client he/she has to message to he/she and then it will first sent to the file server, where it is then routed to its destination. But the disadvantages are that network congestion can be created by the amount of users as well as maintenance problems and the fact that if the main server goes down none of the clients will be able to operate. Peer-peer also has some disadvantages like being less secure than client-server networks, especially so because the files have to shared and no password is required. 

Thursday, September 22, 2011

cisco period 6-7 lab 2.2.5 alexander petridis

Task 3 Reflection
The trace route program is useful to help the user locate the IP address of certain networks or the location of actual sites. This technique allows us to easily access locations to match along with actual websites as well as access their originators and other useful and relevant information.

Task 4 Challenge
Some possible issues that could arise from use of programs such as traceroute is the ability for hackers to have access to your IP address and steal information. IP addressing also has a WhoIs function that can locate people that relate to websites. Email can also be traced and give away ample information. It is disputable that trace routing can be used in multiple purposes but it is risky considering the amount of technical details that it has the potential to reveal to the public.