• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Nachos3T
 

Nachos3T

on

  • 500 views

 

Statistics

Views

Total Views
500
Views on SlideShare
193
Embed Views
307

Actions

Likes
0
Downloads
0
Comments
0

23 Embeds 307

http://os-sistemasoperativos.blogspot.com 186
http://os-sistemasoperativos.blogspot.mx 30
http://os-sistemasoperativos.blogspot.tw 25
http://os-sistemasoperativos.blogspot.in 12
http://os-sistemasoperativos.blogspot.com.es 8
http://os-sistemasoperativos.blogspot.de 8
http://os-sistemasoperativos.blogspot.com.br 5
http://3137243506094566899_4eab906261ab49e0333344854c5de9b801089fcb.blogspot.in 4
http://os-sistemasoperativos.blogspot.ca 4
http://os-sistemasoperativos.blogspot.kr 4
http://os-sistemasoperativos.blogspot.it 3
http://os-sistemasoperativos.blogspot.co.uk 3
http://os-sistemasoperativos.blogspot.fi 2
http://os-sistemasoperativos.blogspot.ro 2
http://os-sistemasoperativos.blogspot.fr 2
http://gabygcardenas.blogspot.com 2
http://os-sistemasoperativos.blogspot.com.au 1
http://os-sistemasoperativos.blogspot.ru 1
http://os-sistemasoperativos.blogspot.co.at 1
http://os-sistemasoperativos.blogspot.nl 1
http://os-sistemasoperativos.blogspot.no 1
http://os-sistemasoperativos.blogspot.pt 1
http://os-sistemasoperativos.blogspot.ae 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Nachos3T Nachos3T Presentation Transcript

    • 3rd Theorical Carmen Suárez Palomares Abraham José Silva Orozco Gabriela García CárdenasSunday, November 20, 11
    • Net working Devices interconnected Share information, files, and resources.Sunday, November 20, 11
    • NETWORKING A sending system: Segments -> adds header bytes Packets Protocol: 1) Format and Order -> Message exchanges 2) Actions taken of a messageSunday, November 20, 11
    • Socket Sockets allow the implementation of a client-server model. Communication must be started by one of the clients. The server waits for the client to start the communication. A socket is a process or an existing thread in the client and server machine, it allows the client and server to read and write information. !Sunday, November 20, 11
    • NETWORK CONNECTIONS 1. Fully connected network 2 2. Partially connected network 3. Hierarchical Network 4. Star Network 1 5. Ring Network 6. Multiaccess bus network (shared link) 7. Hybrid Networks 4 3 6 7 5Sunday, November 20, 11
    • Client-Server Clients connected to server Example: Accessing a web page Chat Client: Sends a demand or ! messages Server: Listen for incoming calls or messagesSunday, November 20, 11
    • Nachos Nachos/code/network -m 1 -o 0 Server (Buffer) Me ReceiverSunday, November 20, 11
    • PING Ping test the state of connection of Protocol host with one or others computers, sending package ICMP Ping works in the network layer, this use the encapsulate the message, in the package and then it sendSunday, November 20, 11
    • Example You Sister n.n Lost You Sister n.nSunday, November 20, 11
    • Ok, she is n.n n.n aliveSunday, November 20, 11
    • Pseudocode ///request Ping() ////answer ping.txt receive_request() validate() validate(request) verify structure if request = true{ execute() answer->send do ping->send } receive_ans(answer) validate() if answer = true{ echo “Connected” } else{ echo “Not Connected” }Sunday, November 20, 11
    • SECURITY Virus Malware Warms Zombies Trojans Others Botnets Funny DoSSunday, November 20, 11
    • Network Zombies & Botnets + = :( (Client-Server) ! !Sunday, November 20, 11
    • Important Points Sending Pings (easy) Server attacks Receive Information Broke elisa’s serverSunday, November 20, 11
    • Cryptography rap hy En c r y p t at i o t o g io n yp i t n Cr f in de f i n i t i o n de C = E( P, K e ) C i ph e r te x tSunday, November 20, 11
    • Cryptography De c r y p t i o n of f s’s de f i n i t i o n k h le e rc c i p K in P = D(C, K d) pr P l a i n te x tSunday, November 20, 11
    • Secret-key criptography Definition symmetric encryption Example In this example the plaintext HELLO would become the cyphertext SVOOL. All As are replaced by Zs, all Bs by Ys, all Cs by Xs and so on key Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A encryption key Monoalphabetic sustitutionSunday, November 20, 11
    • Secret-key criptographySunday, November 20, 11
    • Public-key cryptography ri v a te di f f e re n t k e ys y, p ke ) p ub lic e y ( k ic r n App l ic at i o n e t t io m a -A u t h e n t ic s: m pt at io n sy r y a c - D igi t a l S ig n at u re s en Prov ides: -Con fide ntia lity - Inte grit ySunday, November 20, 11
    • Public-key cryptographySunday, November 20, 11
    • Pseudocode a = “xxx”; b = encrypt_algorithm ke = encrypt_key t_encrypt = b ( a, key) t_encrypt = send ( ) receive ( t_encrypt) kd = decrypt_key if (kd == true){ t_decrypt = b (t_encrypt, kd) a = t_decrypt } else { print “you need the key to decrypt”Sunday, November 20, 11
    • Sunday, November 20, 11
    • References Chat application using Nachos Networking Module http://bit.ly/vtbL63 Uso de criptografía en aplicaciones http://bit.ly/sXGWkx Networking tutorial http://bit.ly/vkb1wQ Protocolo ICMP http://bit.ly/tOAC6c Computer Networking - Kurose Ross Security technolifeandmore.blogspot.comSunday, November 20, 11