This is the outline and notes for a two-day Network session that was part of a workshop held January 26 - February 2, 2015 with representatives from the Information and Communication Technologies Department and Library Department at St. Paul Hospital Millennium Medical College in Addis Ababa, Ethiopia. This session was facilitated by Bob Riddle and Kathleen Ludewig Omollo.
The workshop documents are shared at http://slideshare.net/tag/sphmmc-ict-2015.
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEANGINX, Inc.
On demand recording: https://www.nginx.com/resources/webinars/modsecurity-and-nginx-tuning-the-owasp-core-rule-set-emea/
In this webinar we discuss how to install the OWASP Core Rule Set (CRS) with NGINX and ModSecurity, as well as how to tune it. The CRS protects against many types of attack, including SQL Injection (SQLi), Local File Inclusion (LFI), and Remote Code Execution (RCE). Watch this webinar to learn:
- How to install the OWASP Core Rule Set (CRS) with ModSecurity
- About the types of attacks the CRS blocks, such SQLi, RFI, and LFI
- How to tune the CRS to minimize false positives
- What it looks like when ModSecurity blocks an attack (in a live demo), and how to interpret the audit log
Registration URL: https://attendee.gotowebinar.com/register/937771661672757762
Webinar ID: 374-977-347
Using a set of Network Critical Success Factors (NCSFs) - things network operators need to get right to run a good network - I then use them to evaluate IPv4 Network Address Translation.
I then look at the fundamental nature of IPv6 (and IPv4), and how it can better suite the two different application communications architectures - client-server and peer-to-peer.
Finally, I describe how some of the perceived benefits of NAT can be achieved with IPv6 without performing address translation.
This is an updated version of my AusNOG 2016 presentation on the same topic.
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEANGINX, Inc.
On demand recording: https://www.nginx.com/resources/webinars/modsecurity-and-nginx-tuning-the-owasp-core-rule-set-emea/
In this webinar we discuss how to install the OWASP Core Rule Set (CRS) with NGINX and ModSecurity, as well as how to tune it. The CRS protects against many types of attack, including SQL Injection (SQLi), Local File Inclusion (LFI), and Remote Code Execution (RCE). Watch this webinar to learn:
- How to install the OWASP Core Rule Set (CRS) with ModSecurity
- About the types of attacks the CRS blocks, such SQLi, RFI, and LFI
- How to tune the CRS to minimize false positives
- What it looks like when ModSecurity blocks an attack (in a live demo), and how to interpret the audit log
Registration URL: https://attendee.gotowebinar.com/register/937771661672757762
Webinar ID: 374-977-347
Using a set of Network Critical Success Factors (NCSFs) - things network operators need to get right to run a good network - I then use them to evaluate IPv4 Network Address Translation.
I then look at the fundamental nature of IPv6 (and IPv4), and how it can better suite the two different application communications architectures - client-server and peer-to-peer.
Finally, I describe how some of the perceived benefits of NAT can be achieved with IPv6 without performing address translation.
This is an updated version of my AusNOG 2016 presentation on the same topic.
Zero Day Malware Detection/Prevention Using Open Source SoftwareMyNOG
Zero Day Malware Detection/Prevention Using Open Source Software – Proof of Concept
Fathi Kamil Mohad Zainuddin
Senior Analyst (Malware Research Centre, MyCERT)
ModSecurity and NGINX: Tuning the OWASP Core Rule SetNGINX, Inc.
On demand recording: nginx.com/watch-on-demand/?id=modsecurity-and-nginx-tuning-the-owasp-core-rule-set
In this webinar we discuss how to install the OWASP Core Rule Set (CRS) with NGINX and ModSecurity, as well as how to tune it. The CRS protects against many types of attack, including SQL Injection (SQLi), Local File Inclusion (LFI), and Remote Code Execution (RCE). Watch this webinar to learn:
- How to install the OWASP Core Rule Set (CRS) with ModSecurity
- About the types of attacks the CRS blocks, such SQLi, RFI, and LFI
- How to tune the CRS to minimize false positives
- What it looks like when ModSecurity blocks an attack (in a live demo), and how to interpret the audit log
Presented on 6 September 2013 in a seminar organised by Progreso Training.
Sign up for free seminars at http://progresotraining.eventbrite.sg or http://www.progreso.com.sg/training/event_view_all.php for an overview of IPv6 Security.
Remote-access VPNs allow secure access to corporate resources by establishing an encrypted tunnel
across the Internet. The ubiquity of the Internet, combined with today's VPN technologies, allows
organizations to cost-effectively and securely extend the reach of their networks to anyone, anyplace,
anytime.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...ir. Carmelo Zaccone
This workshop will start with a presentation of results of a study that was conducted for the European Commission on IPv6 and security. This will be followed by presentations from a technology provider who will focus on the security issues related to IPv6. The last presentation will be done by an organisation that has implemented IPv6 and it will share its experiences with the focus on security. At the end of the session, there is a Q&A.
http://ipv6-ghent.fi-week.eu/ipv6-security/
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"Fwdays
Keeping good performance with increased amounts of traffic requires intelligent load balancing, transport affinity, and DDoS protection. In this talk, Helen will give an overview of how to design your network flow to process network packets in the most efficient way. You will learn about different techniques of L4 load balancing, BPF and XDP, software and hardware offload, and what future a new protocol QUIC will bring.
Zero Day Malware Detection/Prevention Using Open Source SoftwareMyNOG
Zero Day Malware Detection/Prevention Using Open Source Software – Proof of Concept
Fathi Kamil Mohad Zainuddin
Senior Analyst (Malware Research Centre, MyCERT)
ModSecurity and NGINX: Tuning the OWASP Core Rule SetNGINX, Inc.
On demand recording: nginx.com/watch-on-demand/?id=modsecurity-and-nginx-tuning-the-owasp-core-rule-set
In this webinar we discuss how to install the OWASP Core Rule Set (CRS) with NGINX and ModSecurity, as well as how to tune it. The CRS protects against many types of attack, including SQL Injection (SQLi), Local File Inclusion (LFI), and Remote Code Execution (RCE). Watch this webinar to learn:
- How to install the OWASP Core Rule Set (CRS) with ModSecurity
- About the types of attacks the CRS blocks, such SQLi, RFI, and LFI
- How to tune the CRS to minimize false positives
- What it looks like when ModSecurity blocks an attack (in a live demo), and how to interpret the audit log
Presented on 6 September 2013 in a seminar organised by Progreso Training.
Sign up for free seminars at http://progresotraining.eventbrite.sg or http://www.progreso.com.sg/training/event_view_all.php for an overview of IPv6 Security.
Remote-access VPNs allow secure access to corporate resources by establishing an encrypted tunnel
across the Internet. The ubiquity of the Internet, combined with today's VPN technologies, allows
organizations to cost-effectively and securely extend the reach of their networks to anyone, anyplace,
anytime.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...ir. Carmelo Zaccone
This workshop will start with a presentation of results of a study that was conducted for the European Commission on IPv6 and security. This will be followed by presentations from a technology provider who will focus on the security issues related to IPv6. The last presentation will be done by an organisation that has implemented IPv6 and it will share its experiences with the focus on security. At the end of the session, there is a Q&A.
http://ipv6-ghent.fi-week.eu/ipv6-security/
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"Fwdays
Keeping good performance with increased amounts of traffic requires intelligent load balancing, transport affinity, and DDoS protection. In this talk, Helen will give an overview of how to design your network flow to process network packets in the most efficient way. You will learn about different techniques of L4 load balancing, BPF and XDP, software and hardware offload, and what future a new protocol QUIC will bring.
OpManager is an integrated network management tool that helps you monitor your network, physical & virtual servers, bandwidth, configurations, firewall, switch ports and IP addresses
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
Sameh Zaghloul
Technology Manager @ IBM
+2 0100 6066012
zaghloul@eg.ibm.com
SDN: Technology that enables data center team to use software to efficiently control network resources
SDN Overview
SDN Standards
NFV – Network Function Virtualization
SDN Scenarios and Use Cases
SDN Sample Research Projects
SDN Technology Survey
SDN Case Study
SDN Online Courses
SDN Lab SW Tools
- OpenStack Framework
- OpenDayLighyt – SDN Controller
- FloodLight – SDN Controller
- Open vSwitch – Virtual Switch
- MiniNet – Virtual Network: OpenFlow Switches, SDN Controllers, and Servers/Hosts
- OMNet++ Network Simulator
- Avior – Sample FloodLight Java Application
- netem - Network Emulation
- NOX/POX - C++/ Python OpenFlow API for building network control applications
- Pyretic = Python + Frenetic - Enables network programmers and operators to write modular network applications by providing powerful abstractions
- Resonance - Event-Driven Control for Software-Defined Networks (written in Pyretic)
SDN Project
OpManager is integrated network management software that offers network monitoring, server monitoring, bandwidth analysis, configuration management, firewall log analysis, server management and IP & switch port management.
Many thanks to Nick McKeown (Stanford), Jennifer Rexford (Princeton), Scott Shenker (Berkeley), Nick Feamster (Princeton), Li Erran Li (Columbia), Yashar Ganjali (Toronto)
OpManager is integrated network management software that offers network monitoring, server monitoring, bandwidth analysis, configuration management, firewall log analysis, and IP & switch port management.
For your final step, you will synthesize the previous steps and laShainaBoling829
For your final step, you will synthesize the previous steps and labs to summarize the major findings from this project.
Specifically, you will prepare a technical report that summarizes your findings including:
1. Provide a table of common ports for protocols we studied. Discuss how security devices can be used to within a larger network to control subnets and devices within those subnets.
2. Discuss network diagnostic tools you used in this lab. Summarize their functionality and describe specifically how you used each tool. Discuss the results you used to assist in both the discovery phase and protocol analysis of the sites you analyzed. What tools impressed you the most and would be most useful for an analyst to employ in the daily activities? What other functionality do you think would be useful to cyber operations analysts?
3. Research and discuss the ethical use of these tools. For example, if you discover a serious vulnerability, what you should you do? What communications should you have with site owners prior to conducting vulnerability scans?
The report should include a title page, table of contents, list of tables and figures (as applicable), content organized into sections. Be sure to properly cite your sources throughout, and include a list of references, formatted in accordance with APA style.
Final Technical Report
31 January 2022
Llyjerylmye Amos
COP 620 Project 1 Final Technical Report
Well-known ports range from 0 to 1023, and are assigned by Internet Assigned Numbers Authority
(IANA) base on the default services that are associated with the assigned ports. Administrators may
obfuscate services that are running on well-known ports by configuring services to be utilized on unused
ephemeral ports. However, the default configuration of well-known ports allow tech savvy personnel
and software vendors to speak a common language when configuring networking devices, information
systems (IS)s and or software applications. Within this lesson, 22-SSH, 23- Telnet, 25-SMTP, 53-DNS, 80-
HTTP, 110-POP3 and 443-HTTPS were the common ports and protocols that were reviewed, table 1.
Port Protocol
22 SSH
23 Telnet
25 SMTP
53 DNS
80 HTTP
110 POP3
443 HTTPS
Table 1. Common ports studies.
Firewalls are the most common network security devices installed on information systems (IS).
According to Cisco (n.d.), “a firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based on a defined set of security
rules”. Security rules may be applied to specific ISs, host-based firewalls, or to the entire network,
network-based firewalls to scan emails, hard drives for malware or to allow traffic on certain sections of
the subnet. Firewalls are also categorized into specific type such as, proxy firewalls, stateful inspection
firewalls, unified threat management firewalls, next-generation firewalls (NGFW), ...
Using Creative Commons for Greater Access and Scale for Your Teaching, Rese...Kathleen Ludewig Omollo
Presentation by Kathleen Ludewig Omollo to peers in Yale University ITS Medicine and Health on February 25, 2020.
Goals for this session:
1. Recognize how copyright affects you as producers and consumers
2. Understand how copyright implications differ in the closed vs. public settings
3. Explain the basics of the Creative Commons licensing scheme
4. Learn how to label, and where and why to share your own work
5. Identify where to direct customers and colleagues to learn more
What I consider when selecting a project management tool, which tools and templates I have found useful, and a look at my processes. This was presented as a webinar by request of one of our partner institutions.
Overview of free tech tools and templates for managing projects with distributed teams. This walks you through my considerations when selecting a project management tool and tech I use and how I communicate reports.
Lessons Learned About Coordinating Academic Partnerships From an Internation...Kathleen Ludewig Omollo
Co-authored poster from Medical Education Day 2014 at University of Michigan about the Academic Partnerships at the core of the African Health OER Network.
Developing and deploying free, adaptable digital learning resources to enhan...Kathleen Ludewig Omollo
Poster presented at Health Professions Education Day at University of Michigan in September 2015 (http://dlhs-umi.ch/hpe-day).
Abstract at http://www.slideshare.net/kludewig/abstract-for-developing-and-deploying-free-adaptable-digital-learning-resources-to-enhance-postgraduate-curricula-partnerships-in-subsaharan-africa.
Design Methods and Lessons for Application Development - Oct 15, 2015Kathleen Ludewig Omollo
Invited talk given to xHub Innovative Society in Addis Ababa, Ethiopia.
Talk abstract at http://www.xhubaddis.com/xhub-speaker-series-design-methods-and-lessons-for-application-development/.
Review of ICT Models to Enhance Medical Education: Video Conferencing, Lectur...Kathleen Ludewig Omollo
CC BY Kathleen Ludewig Omollo, Bob Riddle, Ted Hanss. Copyright 2015 The Regents of the University of Michigan. Unless otherwise noted, this presentation is shared under a Creative Commons Attribution 4.0 License.
Curriculum Development: Increasing access to and reach of learning resources ...Kathleen Ludewig Omollo
Presentation to consortium members on July 28, 2014. For more about the consortium, see http://1000obgyns.org/. Since the event, the associated open educational resources have been posted to http://open.umich.edu/education/med/1000obgyns/.
This is an outline for a session January 30, 2015.
This is from a workshop on January 26 - February 2, 2015 with representatives from the Information and Communication Technologies Department and Library Department at St. Paul Hospital Millennium Medical College in Addis Ababa, Ethiopia. The workshop was facilitated by Kathleen Ludewig Omollo and Bob Riddle.
The workshop documents are shared at http://slideshare.net/tag/sphmmc-ict-2015.
This is a handout for a form on project planning used January 30, 2015.
This is from a workshop on January 26 - February 2, 2015 with representatives from the Information and Communication Technologies Department and Library Department at St. Paul Hospital Millennium Medical College in Addis Ababa, Ethiopia. The workshop was facilitated by Kathleen Ludewig Omollo and Bob Riddle.
The workshop documents are shared at http://slideshare.net/tag/sphmmc-ict-2015.
This is an outline for a workshop session titled Content Management Strategy and Demos, which was given on January 28, 2015.
This is from a workshop on January 26 - February 2, 2015 with representatives from the Information and Communication Technologies Department and Library Department at St. Paul Hospital Millennium Medical College in Addis Ababa, Ethiopia. The workshop was facilitated by Kathleen Ludewig Omollo and Bob Riddle.
The workshop documents are shared at http://slideshare.net/tag/sphmmc-ict-2015.
This is an outline for a workshop session titled Trends in Health and ICT - Incredible Opportunities for Technologists and Librarians at SPHMMC, which was given on January 28, 2015.
This is from a workshop on January 26 - February 2, 2015 with representatives from the Information and Communication Technologies Department and Library Department at St. Paul Hospital Millennium Medical College in Addis Ababa, Ethiopia. The workshop was facilitated by Kathleen Ludewig Omollo and Bob Riddle.
The workshop documents are shared at http://slideshare.net/tag/sphmmc-ict-2015.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. 1
Workshop: Strengthening Capacity for Information Resources and ICT to Support Growing Academic
Programs at SPHMMC, Facilitators: Bob Riddle, Kathleen Ludewig Omollo, University of Michigan
This document is Copyright 2015 The Regents of the University of Michigan. It is shared under a Creative
Commons Attribution 4.0 License http://creativecommons.org/licenses/by/4.0/.
Session 1,2,3,4 Network: Session Outline and Notes, January 26-27, 2015
Learning Objectives 1) Understand the basic components of a network infrastructure
2) Understand how to capture uptime, availability, capability of a network
3) Identify the location the problem if the Internet connection is down
4) Practice methods to manage or monitor a network offsite (e.g. secure shell
login, ftp, get, put, up time dashboards, virtual private networks,
http://www.downforeveryoneorjustme.com/)
5) Practice how to configure or troubleshoot server, switch, firewall
6) Search server log
7) Export terminal or command prompt history
8) Practice how to configure a subnet and segment a network between local,
regional, and international
9) Learn how to setup a local server for experimentation
10) Understand how to read a network diagram
11) Understand where to look up networking standards for cabling, labeling
12) Explain the different connection speeds and ranges based on the network
medium (802.11 b/n/g, 2G, Fiber, DSL, Broadband, Bluetooth)
13) Review to how to setup file and printer sharing over a network on Windows 7
and Mac OSX 16x+
Discussion
Questions
1) What buildings at SPHMMC are currently connected to the Internet?
2) What parts of the physical and virtual network infrastructure is configured or
maintained by SPHMMC? By other institutions?
3) What organizations are involved in the network
4) How does WOREDAnet connect or relate to the main St. Paul network?
5) Who do you contact when the Internet connection is down?
6) Who do you contact when some of the network equipment is broken?
7) What is expected uptime for the Internet for SPHMMC?
8) What happens when the network is down when the ICT staff are gone?
Terms and
Concepts
Router, switch, server, client, uptime, downtime, uplink, downlink, DNS, IP, latency,
ping, DHCP, subnet, LAN, WAN, cloud, offline, cache, firewall, proxy, packet
shaping, VPN, traceroute, meshnetwork
Hands-On Activities
with Specific
Technologies
Router: Cisco3900 Series
Switch: ZTE product (ZXR10 5928E), Core switch (ZXR10 5928E) this is a
Layer 3 switch, AGG switch (ZXR10 5952E), Access switch (ZXR10
2928E),Dell Power connect 6224
Access point: Cisco Aironet (AIR-RN1252) and DLINK (DWL-2100 AP)
Server Operating system: Windows Server 2008 R2 service pack 1
Firewall: ZTE equipment model ZXSEC US 1612 firmware version: v4.0,
build8236,100218(MR1)
Configuration of Banana Pi Offline Access Point
Network Monitoring Tools: Nagios, webmin, WireShark, the Dude
References 1) Book: Network Troubleshooting Tools, J. Sloan
2) Book: Networking for Dummies, D. Lowe
3) Book: Linux for Beginners, J. Cannon
4) Book: The Practice of System and Network Administration, T. Limoncelli
5) OER – Network Slides from Bob
6) OER - SI 502 - Networked Computing: Storage, Communication, Processing
2. 2
Notes – January 26, 2015
How many people do you want to connect?
- What type of connectivity - wired, wifi, or both
- Managed switch - it will keep info about status and things that have happened, it will log
- An unmanaged switch doesn’t store any of the status
- Filtering increases the amount of processing and time by the router before it passes it on
- Through VLAN, can give maximum download or upload per port, per device, or per IP pattern
(subnet)
- Tip: Set DHCP at Router Level rather than Central Server.
- To increase local IP addresses – use Network Address Translation (NAT) and Nonroutable IPs
(includes 10.x.x.x, 192.168.x.x)
- Network Time Proposal - network provided protocol; used to keep all of your servers in synced
times and to keep synced time with external organizations
From TP Link Router Admin walkthrough
When to set IP
- e.g. set reserved for shared printer that people connect to by IP; Printer just needs to have some
network connection wireless or wired
- Most common tasks - SSID, Password (WPA is more secure than WEP), DHCP, Logs
Tip
1. Firmware updates - If not experiencing problem or vulnerability, wait until 6 months to apply
firmware updates to observe if stable.
2. Use Excel file Keep date, backup, name of router, location of router
3. Don’t leave statistics on all the time; when on it takes processor aware for forwarding on
package
Notes – January 27, 2015
commands
> ipconfig (on Windows) or > ifconfig (on Mac, Linux)
> arp -a
3. 3
> ping
> traceroute
windows > unix (Linux)
1. Show all commands: help > help
2. Show the instructions for how to use a comment:
3. List current directory: dir > pwd
4. List files in current directory: dir > ls -a
5. Change directory: cd
6. Show history: F7 > history
7. Search: find > grep
8. Trace route: tracert > traceroute
9. Show gateways: netstat -nr > netstat -nr
Websites
• http://www.who.is/
• nmap.org
• webmin.com
Tools
• Windows > Event Viewer
• SSH to access a Linux/Unix server
• Remote Desktop to access a Windows Server remotely
• Nagios Core - Free download
• iperf
• PerfSonar
what determines connection speed?
“Your speed is only as fast as your slowest connection"
ISP
Wire
Switch
Wire
Router
802.11 b - up to 11 Megabit per second
802.11 g - 54 Megabit per second
802.11 n - 300 Megabit per second
802.11 ac - 1300 Megabit per second
Connection - cat 5e Ethernet - 1 gigabit per second
- cat 6 Ethernet -10 gigabit per second
5. 5
Questions
• How can you tell the maximum speed at any point in network? iperf
• How can you tell the average connection speed all all users connected right now? PerfSonar
◦ - to a router
◦ - to a Switch?
◦ - to a server?
• How can you set the maximum speed of all devices in general?
• How can you set the maximum speed for a specific device?