SlideShare a Scribd company logo
1 of 23
3rd Theorical
                           Carmen Suárez Palomares
                           Abraham José Silva Orozco
                            Gabriela García Cárdenas




Sunday, November 20, 11
Net working
           Devices interconnected
           Share information, files, and resources.




Sunday, November 20, 11
NETWORKING

                          A sending system:

                          Segments -> adds header bytes

                          Packets

                          Protocol:

                          1) Format and Order -> Message exchanges

                          2) Actions taken of a message



Sunday, November 20, 11
Socket
   Sockets allow the implementation
   of a client-server model.
   Communication must be started by
   one of the clients. The server waits
   for the client to start the
   communication.

   A socket is a process or an
   existing thread in the client and
   server machine, it      allows the
   client and server to read and write
   information.                           !

Sunday, November 20, 11
NETWORK CONNECTIONS
         1. Fully connected network                         2
         2. Partially connected network
         3. Hierarchical Network
         4. Star Network
                                                    1
         5. Ring Network
         6. Multiaccess bus network (shared link)
         7. Hybrid Networks
                                                        4       3
       6                    7
                                                                5


Sunday, November 20, 11
Client-Server
                 Clients connected to server

           Example: Accessing a web
           page
           Chat
           Client: Sends a demand or           !

           messages
           Server: Listen for incoming calls
           or messages


Sunday, November 20, 11
Nachos
                          Nachos/code/network


                          -m 1 -o 0             Server
                                                 (Buffer)
                          Me Receiver




Sunday, November 20, 11
PING
         Ping test the state
          of connection of         Protocol
          host with one or
         others computers,
         sending package
                ICMP            Ping works in the network layer, this
                               use the encapsulate the message, in the
                                      package and then it send

Sunday, November 20, 11
Example
                          You
                                 Sister


                           n.n            Lost


                          You
                                 Sister


                          n.n
Sunday, November 20, 11
Ok, she is              n.n   n.n
    alive




Sunday, November 20, 11
Pseudocode
                          ///request

              Ping()                   ////answer
                ping.txt               receive_request()
              validate()               validate(request)
                verify structure       if request = true{
              execute()                 answer->send
                do ping->send          }
              receive_ans(answer)
              validate()
              if answer = true{
                echo “Connected”
              }
              else{
              echo “Not Connected”
              }


Sunday, November 20, 11
SECURITY
                                    Virus
     Malware
                                Warms
                                             Zombies
                      Trojans
    Others
                                        Botnets    Funny
                                                           DoS


Sunday, November 20, 11
Network
       Zombies & Botnets +                 =   :(
                           (Client-Server)




                             !




                                                    !

Sunday, November 20, 11
Important Points

                   Sending Pings (easy)
                   Server attacks
                   Receive Information
                   Broke elisa’s server


Sunday, November 20, 11
Cryptography

                         rap hy          En c r y p t at i o
                    t o g io n
                 yp i t                                       n
               Cr f in                     de f i n i t i o n
                  de
                                          C = E( P, K e )


                   C i ph e r te x
                                     t


Sunday, November 20, 11
Cryptography
                                              De c r y p t i o n
                                  of f s’s    de f i n i t i o n
                               k h le
                           e rc c i p
                          K in               P = D(C, K d)
                             pr


                     P l a i n te x t



Sunday, November 20, 11
Secret-key criptography
           Definition symmetric encryption
           Example          In this example the plaintext HELLO would become the cyphertext SVOOL.

           All As are replaced by Zs, all Bs by Ys, all Cs by Xs and so on
                          key
                Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
                Ciphertext: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A

                          encryption key
                                    Monoalphabetic sustitution
Sunday, November 20, 11
Secret-key criptography




Sunday, November 20, 11
Public-key cryptography

                                                                  ri v a te
                di f f e re n t k e ys                     y, p
                                                         ke )
                                                 p ub lic e y
                                               (          k
                                     ic
                                    r n                     App l ic at i o n
                                 e t t io
                               m a                        -A u t h e n t ic    s:
                             m pt                                           at io n
                           sy r y
                          a c                          - D igi t a l S ig
                                                                          n at u re s
                           en              Prov ides:
                                        -Con fide ntia lity
                                          - Inte grit y
Sunday, November 20, 11
Public-key cryptography




Sunday, November 20, 11
Pseudocode
                          a = “xxx”;

       b = encrypt_algorithm
       ke = encrypt_key

       t_encrypt = b ( a, key)
       t_encrypt = send ( )

       receive ( t_encrypt)
       kd = decrypt_key
       if (kd == true){
              t_decrypt = b (t_encrypt, kd)
              a = t_decrypt
              }
       else
            {
            print “you need the key to decrypt”



Sunday, November 20, 11
Sunday, November 20, 11
References
            Chat application using Nachos Networking Module
            http://bit.ly/vtbL63
            Uso de criptografía en aplicaciones
            http://bit.ly/sXGWkx
            Networking tutorial
            http://bit.ly/vkb1wQ
            Protocolo ICMP
            http://bit.ly/tOAC6c
            Computer Networking - Kurose Ross
            Security
            technolifeandmore.blogspot.com
Sunday, November 20, 11

More Related Content

Similar to Nachos3T

Beginners guide-concurrency
Beginners guide-concurrencyBeginners guide-concurrency
Beginners guide-concurrencyMichael Barker
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...PROIDEA
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlOpenDNS
 

Similar to Nachos3T (6)

Beginners guide-concurrency
Beginners guide-concurrencyBeginners guide-concurrency
Beginners guide-concurrency
 
Internet security
Internet securityInternet security
Internet security
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Nachos3T

  • 1. 3rd Theorical Carmen Suárez Palomares Abraham José Silva Orozco Gabriela García Cárdenas Sunday, November 20, 11
  • 2. Net working Devices interconnected Share information, files, and resources. Sunday, November 20, 11
  • 3. NETWORKING A sending system: Segments -> adds header bytes Packets Protocol: 1) Format and Order -> Message exchanges 2) Actions taken of a message Sunday, November 20, 11
  • 4. Socket Sockets allow the implementation of a client-server model. Communication must be started by one of the clients. The server waits for the client to start the communication. A socket is a process or an existing thread in the client and server machine, it allows the client and server to read and write information. ! Sunday, November 20, 11
  • 5. NETWORK CONNECTIONS 1. Fully connected network 2 2. Partially connected network 3. Hierarchical Network 4. Star Network 1 5. Ring Network 6. Multiaccess bus network (shared link) 7. Hybrid Networks 4 3 6 7 5 Sunday, November 20, 11
  • 6. Client-Server Clients connected to server Example: Accessing a web page Chat Client: Sends a demand or ! messages Server: Listen for incoming calls or messages Sunday, November 20, 11
  • 7. Nachos Nachos/code/network -m 1 -o 0 Server (Buffer) Me Receiver Sunday, November 20, 11
  • 8. PING Ping test the state of connection of Protocol host with one or others computers, sending package ICMP Ping works in the network layer, this use the encapsulate the message, in the package and then it send Sunday, November 20, 11
  • 9. Example You Sister n.n Lost You Sister n.n Sunday, November 20, 11
  • 10. Ok, she is n.n n.n alive Sunday, November 20, 11
  • 11. Pseudocode ///request Ping() ////answer ping.txt receive_request() validate() validate(request) verify structure if request = true{ execute() answer->send do ping->send } receive_ans(answer) validate() if answer = true{ echo “Connected” } else{ echo “Not Connected” } Sunday, November 20, 11
  • 12. SECURITY Virus Malware Warms Zombies Trojans Others Botnets Funny DoS Sunday, November 20, 11
  • 13. Network Zombies & Botnets + = :( (Client-Server) ! ! Sunday, November 20, 11
  • 14. Important Points Sending Pings (easy) Server attacks Receive Information Broke elisa’s server Sunday, November 20, 11
  • 15. Cryptography rap hy En c r y p t at i o t o g io n yp i t n Cr f in de f i n i t i o n de C = E( P, K e ) C i ph e r te x t Sunday, November 20, 11
  • 16. Cryptography De c r y p t i o n of f s’s de f i n i t i o n k h le e rc c i p K in P = D(C, K d) pr P l a i n te x t Sunday, November 20, 11
  • 17. Secret-key criptography Definition symmetric encryption Example In this example the plaintext HELLO would become the cyphertext SVOOL. All As are replaced by Zs, all Bs by Ys, all Cs by Xs and so on key Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A encryption key Monoalphabetic sustitution Sunday, November 20, 11
  • 19. Public-key cryptography ri v a te di f f e re n t k e ys y, p ke ) p ub lic e y ( k ic r n App l ic at i o n e t t io m a -A u t h e n t ic s: m pt at io n sy r y a c - D igi t a l S ig n at u re s en Prov ides: -Con fide ntia lity - Inte grit y Sunday, November 20, 11
  • 21. Pseudocode a = “xxx”; b = encrypt_algorithm ke = encrypt_key t_encrypt = b ( a, key) t_encrypt = send ( ) receive ( t_encrypt) kd = decrypt_key if (kd == true){ t_decrypt = b (t_encrypt, kd) a = t_decrypt } else { print “you need the key to decrypt” Sunday, November 20, 11
  • 23. References Chat application using Nachos Networking Module http://bit.ly/vtbL63 Uso de criptografía en aplicaciones http://bit.ly/sXGWkx Networking tutorial http://bit.ly/vkb1wQ Protocolo ICMP http://bit.ly/tOAC6c Computer Networking - Kurose Ross Security technolifeandmore.blogspot.com Sunday, November 20, 11