SlideShare a Scribd company logo
1 of 23
3rd Theorical
                           Carmen Suárez Palomares
                           Abraham José Silva Orozco
                            Gabriela García Cárdenas




Sunday, November 20, 11
Net working
           Devices interconnected
           Share information, files, and resources.




Sunday, November 20, 11
NETWORKING

                          A sending system:

                          Segments -> adds header bytes

                          Packets

                          Protocol:

                          1) Format and Order -> Message exchanges

                          2) Actions taken of a message



Sunday, November 20, 11
Socket
   Sockets allow the implementation
   of a client-server model.
   Communication must be started by
   one of the clients. The server waits
   for the client to start the
   communication.

   A socket is a process or an
   existing thread in the client and
   server machine, it      allows the
   client and server to read and write
   information.                           !

Sunday, November 20, 11
NETWORK CONNECTIONS
         1. Fully connected network                         2
         2. Partially connected network
         3. Hierarchical Network
         4. Star Network
                                                    1
         5. Ring Network
         6. Multiaccess bus network (shared link)
         7. Hybrid Networks
                                                        4       3
       6                    7
                                                                5


Sunday, November 20, 11
Client-Server
                 Clients connected to server

           Example: Accessing a web
           page
           Chat
           Client: Sends a demand or           !

           messages
           Server: Listen for incoming calls
           or messages


Sunday, November 20, 11
Nachos
                          Nachos/code/network


                          -m 1 -o 0             Server
                                                 (Buffer)
                          Me Receiver




Sunday, November 20, 11
PING
         Ping test the state
          of connection of         Protocol
          host with one or
         others computers,
         sending package
                ICMP            Ping works in the network layer, this
                               use the encapsulate the message, in the
                                      package and then it send

Sunday, November 20, 11
Example
                          You
                                 Sister


                           n.n            Lost


                          You
                                 Sister


                          n.n
Sunday, November 20, 11
Ok, she is              n.n   n.n
    alive




Sunday, November 20, 11
Pseudocode
                          ///request

              Ping()                   ////answer
                ping.txt               receive_request()
              validate()               validate(request)
                verify structure       if request = true{
              execute()                 answer->send
                do ping->send          }
              receive_ans(answer)
              validate()
              if answer = true{
                echo “Connected”
              }
              else{
              echo “Not Connected”
              }


Sunday, November 20, 11
SECURITY
                                    Virus
     Malware
                                Warms
                                             Zombies
                      Trojans
    Others
                                        Botnets    Funny
                                                           DoS


Sunday, November 20, 11
Network
       Zombies & Botnets +                 =   :(
                           (Client-Server)




                             !




                                                    !

Sunday, November 20, 11
Important Points

                   Sending Pings (easy)
                   Server attacks
                   Receive Information
                   Broke elisa’s server


Sunday, November 20, 11
Cryptography

                         rap hy          En c r y p t at i o
                    t o g io n
                 yp i t                                       n
               Cr f in                     de f i n i t i o n
                  de
                                          C = E( P, K e )


                   C i ph e r te x
                                     t


Sunday, November 20, 11
Cryptography
                                              De c r y p t i o n
                                  of f s’s    de f i n i t i o n
                               k h le
                           e rc c i p
                          K in               P = D(C, K d)
                             pr


                     P l a i n te x t



Sunday, November 20, 11
Secret-key criptography
           Definition symmetric encryption
           Example          In this example the plaintext HELLO would become the cyphertext SVOOL.

           All As are replaced by Zs, all Bs by Ys, all Cs by Xs and so on
                          key
                Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
                Ciphertext: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A

                          encryption key
                                    Monoalphabetic sustitution
Sunday, November 20, 11
Secret-key criptography




Sunday, November 20, 11
Public-key cryptography

                                                                  ri v a te
                di f f e re n t k e ys                     y, p
                                                         ke )
                                                 p ub lic e y
                                               (          k
                                     ic
                                    r n                     App l ic at i o n
                                 e t t io
                               m a                        -A u t h e n t ic    s:
                             m pt                                           at io n
                           sy r y
                          a c                          - D igi t a l S ig
                                                                          n at u re s
                           en              Prov ides:
                                        -Con fide ntia lity
                                          - Inte grit y
Sunday, November 20, 11
Public-key cryptography




Sunday, November 20, 11
Pseudocode
                          a = “xxx”;

       b = encrypt_algorithm
       ke = encrypt_key

       t_encrypt = b ( a, key)
       t_encrypt = send ( )

       receive ( t_encrypt)
       kd = decrypt_key
       if (kd == true){
              t_decrypt = b (t_encrypt, kd)
              a = t_decrypt
              }
       else
            {
            print “you need the key to decrypt”



Sunday, November 20, 11
Sunday, November 20, 11
References
            Chat application using Nachos Networking Module
            http://bit.ly/vtbL63
            Uso de criptografía en aplicaciones
            http://bit.ly/sXGWkx
            Networking tutorial
            http://bit.ly/vkb1wQ
            Protocolo ICMP
            http://bit.ly/tOAC6c
            Computer Networking - Kurose Ross
            Security
            technolifeandmore.blogspot.com
Sunday, November 20, 11

More Related Content

Similar to Nachos3T

Beginners guide-concurrency
Beginners guide-concurrencyBeginners guide-concurrency
Beginners guide-concurrencyMichael Barker
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...PROIDEA
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlOpenDNS
 

Similar to Nachos3T (6)

Beginners guide-concurrency
Beginners guide-concurrencyBeginners guide-concurrency
Beginners guide-concurrency
 
Internet security
Internet securityInternet security
Internet security
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Nachos3T

  • 1. 3rd Theorical Carmen Suárez Palomares Abraham José Silva Orozco Gabriela García Cárdenas Sunday, November 20, 11
  • 2. Net working Devices interconnected Share information, files, and resources. Sunday, November 20, 11
  • 3. NETWORKING A sending system: Segments -> adds header bytes Packets Protocol: 1) Format and Order -> Message exchanges 2) Actions taken of a message Sunday, November 20, 11
  • 4. Socket Sockets allow the implementation of a client-server model. Communication must be started by one of the clients. The server waits for the client to start the communication. A socket is a process or an existing thread in the client and server machine, it allows the client and server to read and write information. ! Sunday, November 20, 11
  • 5. NETWORK CONNECTIONS 1. Fully connected network 2 2. Partially connected network 3. Hierarchical Network 4. Star Network 1 5. Ring Network 6. Multiaccess bus network (shared link) 7. Hybrid Networks 4 3 6 7 5 Sunday, November 20, 11
  • 6. Client-Server Clients connected to server Example: Accessing a web page Chat Client: Sends a demand or ! messages Server: Listen for incoming calls or messages Sunday, November 20, 11
  • 7. Nachos Nachos/code/network -m 1 -o 0 Server (Buffer) Me Receiver Sunday, November 20, 11
  • 8. PING Ping test the state of connection of Protocol host with one or others computers, sending package ICMP Ping works in the network layer, this use the encapsulate the message, in the package and then it send Sunday, November 20, 11
  • 9. Example You Sister n.n Lost You Sister n.n Sunday, November 20, 11
  • 10. Ok, she is n.n n.n alive Sunday, November 20, 11
  • 11. Pseudocode ///request Ping() ////answer ping.txt receive_request() validate() validate(request) verify structure if request = true{ execute() answer->send do ping->send } receive_ans(answer) validate() if answer = true{ echo “Connected” } else{ echo “Not Connected” } Sunday, November 20, 11
  • 12. SECURITY Virus Malware Warms Zombies Trojans Others Botnets Funny DoS Sunday, November 20, 11
  • 13. Network Zombies & Botnets + = :( (Client-Server) ! ! Sunday, November 20, 11
  • 14. Important Points Sending Pings (easy) Server attacks Receive Information Broke elisa’s server Sunday, November 20, 11
  • 15. Cryptography rap hy En c r y p t at i o t o g io n yp i t n Cr f in de f i n i t i o n de C = E( P, K e ) C i ph e r te x t Sunday, November 20, 11
  • 16. Cryptography De c r y p t i o n of f s’s de f i n i t i o n k h le e rc c i p K in P = D(C, K d) pr P l a i n te x t Sunday, November 20, 11
  • 17. Secret-key criptography Definition symmetric encryption Example In this example the plaintext HELLO would become the cyphertext SVOOL. All As are replaced by Zs, all Bs by Ys, all Cs by Xs and so on key Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A encryption key Monoalphabetic sustitution Sunday, November 20, 11
  • 19. Public-key cryptography ri v a te di f f e re n t k e ys y, p ke ) p ub lic e y ( k ic r n App l ic at i o n e t t io m a -A u t h e n t ic s: m pt at io n sy r y a c - D igi t a l S ig n at u re s en Prov ides: -Con fide ntia lity - Inte grit y Sunday, November 20, 11
  • 21. Pseudocode a = “xxx”; b = encrypt_algorithm ke = encrypt_key t_encrypt = b ( a, key) t_encrypt = send ( ) receive ( t_encrypt) kd = decrypt_key if (kd == true){ t_decrypt = b (t_encrypt, kd) a = t_decrypt } else { print “you need the key to decrypt” Sunday, November 20, 11
  • 23. References Chat application using Nachos Networking Module http://bit.ly/vtbL63 Uso de criptografía en aplicaciones http://bit.ly/sXGWkx Networking tutorial http://bit.ly/vkb1wQ Protocolo ICMP http://bit.ly/tOAC6c Computer Networking - Kurose Ross Security technolifeandmore.blogspot.com Sunday, November 20, 11