Posts

Showing posts from October, 2017

Flash Talk Voice Recording

https://vocaroo.com/i/s1dn6u9b3vLn

Net Neutrality Flash Talk Outline

What is the reference? What did I learn from this reference? What are the positive (+) and negative (-) impacts on society, economy, or culture?  What do I want people to know about this? What connections can I make to what I’ve learned about the Internet so far?   Reference 1 (wikipedia) (+) -Data on the internet is treated equally -Internet service provider’s power is limited -ISPs are unable to intentionally block, slow down, or charge money for specific websites and online content. (-) -Can result in higher taxes -NN could be used to enable hate speech as it protects the rights of everyone. - -Created in 2003 by professor Tim Wu -The internet was getting so big at this point, there needed to be a set of rules that prevented big corporations from taking over the internet and charging lots of money for its use. Reference 2: https://www.savetheinternet.com/net-neutrality-what-you-need-know-now (+) -Net Neutrality prohibits ISPs like AT...

Net Neutrality Flash Talk

Aidan Net Neutrality Flash Talk Net Neutrality is an important part of our experience on the internet. Net Neutrality is a protocol for the internet that limits the power of big corporations and ISPs, and keeps the internet free and open for all who use it. Thanks to Net Neutrality, ISPs are unable to intentionally block, slow down, or charge money for specific websites and online content. The term “Net Neutrality” was coined in 2003 by professor Tim Wu. He saw, along with others, that as the internet continued to expand, it was getting so big that there needed to be a set of rules that would help govern it, prevent big corporations from taking over the internet and charging lots of money for its use. This is what the original creators of the internet intended, to have a free and open system, and Net Neutrality is what helps keep the internet that way. However, despite all these innovations, there are still ever-present threats to Net Neutrality. Ajit Pai, chairman of the FCC, ...

HTTP and Abstraction: Blown to Bits Response

Blown to Bits, Appendix: The layers of protocols used in network communication is an example of abstraction. Can you give other examples of abstraction in everyday life? -Abstraction is used for many things in our everyday lives. For example, abstraction can help us in problem solving, in imagination, and in thoughtfulness. When you browse to a web page, maybe with some animated advertisements embedded on it, describe in detail what happens behind the scenes to display that page on your browser. -The DNS of the website finds the IP Address of the computer, and then the website groups TCP packets together and sends them to the website. This is how the ad is displayed. Blown to Bits, Chapter 3: Question about abstraction: Discuss how not knowing some basics of how a software tool or computer works, and the abstractions they use, could lead to bad outcomes. -This could lead to many problems. For example, if the program is not used as it is intended to, problems and errors ...

Reflection and Questions on DDoS Flood Attack Article

Article title: “DNS Flood DDoS Attack Hit Video Gaming Industry with 90 Million Requests per Second” Article summary: In 2014, hackers launched a large scale DNS attack against a large scale video gaming website. The peak of the attack was above 110 Gbps. Hackers used the DNS flood attack to execute the attack. The packets that were sent during the attack were larger than normal, which helped to cripple the server. Hackers are using every tantrum by leveraging system applications to compromise them using their botnet network. Questions: Since 2014, have larger DDos attacks happened? What did the hackers take when they attacked this server? What did they want? What was the overall goal of this attack? Did the company that got attacked make their servers more secure to DNS attacks?

Blown to Bits Reflections 10/7

Blown to Bits (www.bitsbook.com), Appendix - The Internet as System and Spirit, pp. 301-309, “The Internet as a Communication System,” then answer the following question: It is interesting to think about the foresight (or luck?) that caused initial Internet designers to choose a packet-switched network as the basis for the Internet. What do you think, foresight or luck? -I think that it is good foresight that caused the internet’s creators to choose a packet switched network as the basis for the internet. In order to create the internet successfully, these guys had to be decently smart, and I think that they thought ahead and decided to use a system that could be expanded rapidly. Blown to Bits (www.bitsbook.com), Chapter 3 - Ghosts in the Machine, pp. 91-92, “Data Formats as Public Property,” then answer the following question: What do you think the Internet would be like today if different companies’ network protocols were still competing for adoption for the Internet, ...

DNS Day 4 Reflection

What is DNS? -DNS: Domain Name Servers. DBS directs dinuba names and transfers them into IP addresses. Why does the Internet use IP addresses? -Because IP addresses are simple and fast. There are many possible IP address combinations. Why don’t we need to know IP addresses? -Because websites have domain names, which redirect us to the IP address. Domain names take the place of IP addresses. Why do we need a Domain Name System? -It would be too complicated to constantly type in IP addresses, so a domain name system is needed. Why don’t we all maintain our own DNS? -Because many people own multiple sites and trust their ISP services to maintain the DNS for them. ISP services maintain a reliable and stable DNS connection. Is there one big DNS for the entire Internet? -No, there are many different DNS servers that interconnect throughout the internet. How do you think all these DNS servers are maintained? -Through constant maintaining. Since there are so many DNS servers, if o...

Routers and Redundancy Reflection

Describe the relative benefits of routing over a broadcast style of communication. Is routing traffic more secure than broadcasting? Justify your answer. Routing messages to a specific address instead of broadcasting it reduces the number of people that can see it. Therefore, routing traffic is more secure than broadcasting. Can you know in advance the path a message will take between you and another computer on the Internet? Justify your answer. No, you cannot because the most effective route will constantly change. An Internet service provider (ISP) just purchased all the routers in your area. What types of things is this ISP capable of doing? Are you comfortable with this arrangement? This ISP can see all user history, and because of their monopoly, they can control the price of internet service. I am not comfortable in this arrangement, because of this.

Simple DOS IP Packet Checks (Instructions)

Image
To confirm if packet loss is occurring: At  Start Menu type  "cmd". Type "ping -n 20 8.8.8.8". ... Once the command has run, a summary will be presented indicating if loss occurred. To check IP address is working: Type ping :serveraddress”.com and press the Enter key. The word ping is followed by a space and then the name of a server or an IP address Ie: ping annastaqueria.com To check for packet loss: Open a command prompt on a client PC, via the Start Menu search for "cmd". Type "ping -n 20 8.8.8.8". This will ping the address 8.8.8.8 20 times. Substitute 8.8.8.8 with whatever address must be tested to. Once the command has run, a summary will be presented indicating if loss occurred. If no loss occurred, try increasing the "-n" value to something higher (such as 100) to test for a longer period of time. Note: This only tests for packet loss impacting ICMP or all traffic. Protocol specific loss...

Broadcast Battleship Response

If your messaging scheme your group designed was used on the Internet, what could go wrong in terms of security and privacy? What could a malicious person do? What if the messages sent were something personal such as a conversation or communication with a bank not just a game? -There are many things that are insecure about the messaging system we devised. First, there is no clear way of identifying who’s who. Anybody could send someone else a message, and claim it was from someone else. For example, Inal could send Amir a message, and then claim that it’s from Andrei, since there is no way of knowing who actually sent the message. -It would not be a good idea to use this internet simulator to send messages back and forth between a bank and myself, since the internet simulator is not secure. Messages are broadcast across the simulator, and anyone who joins the simulator can just see all the messages at once, there is no privacy to the simulator.