CSE450/598 Design And Analysis of Algorithms HW01, Wednesday, 09/02/2009, Due: Monday, 09/14/2009
A Please note that you have to typeset your assignment using either L TEX or Microsoft Word. Hand-written assignment will not be graded.
Please submit a hard
By Dijiang Huang
Security mechanisms implement functions that help to prevent, detect, tolerate,
Protocol Stacks and Layering Network Addressing Subnetting CIDR Route Aggregation
Internet History and Infrastructure
Kleinrock (1962) - communication nets
showed that packet switching is a viab
Overview of Network Security
What is the Problem?
2002 Study by Computer Security Institute
90% of respondents were hacked 80% of those lost money (about $450 million) 75% of those attacks came from across the net
Problem seems to be getting wo
Wireshark ( or Ethereal, man and User Manual) - by Dijiang Huang
Protocol Analysis: The Process
What is the problem? How do we solve it? Tools
Ethereal Etherpeek Sniffer etc.
TCP/IP protocol suite
Application Layer protoc
Interior Gateway Protocols Exterior Gateway Protocols - by Dijiang Huang
Routing within Networks
3 1 7 4 2 8
Routing within Networks
Next Hop routing Dest: Next Dest (1) Hop (2) 1 1 2 1-2 2 3 1-3 3 4 1-2 4 :
Next Dest Next Dest
World Wide Web
To share information across the Internet in a Publishing mode
Net user with information to share makes it available in a suitable format on a web server. Other Net users who know (or can find) the location of t
What is Cross-Site Scripting? What is the impact of Cross-Site Scripting? What are Cross-Site Scripting Techniques?
Basic anatomy of Attacks
How can we protect applications against it?
A quick iptables Tutorial
By Dijiang Huang February, 2009 1. iptables basics
What is iptables:
Iptables is in short a Linux based packet filtering firewall. Iptables interfaces to the Linux netfilter module to perform filtering of network packets. This ca
Examples of route aggregation. The goal of route aggregation is to reduce the number of network entries in routers. However, the aggregation must satisfy two requirements: 1. The aggregation must not overclaim, i.e., including IP networks that are not in
Standard: Fast Ethernet specification (IEEE 802.3u) known as 100BASE-T. HP: 100VG-AnyLAN is a 100-Mbps technology that uses a demandpriority protocol over four pairs of Category 3 UTP cable.
Why still 802.3 LAN?
1. The need to be backward co
Chapter 3 Firewall
Basic approaches to protect your site 1. No security! 2. Security through obscurity: a system is presumed to be secure simply because (supposedly) nobody knows about it - its existence, contents, security measures, or anything else. Thi
Using Master subtitle style Secure Search Engine Click to edit to Counter Web based ManCapstone Project Description
What What How
is web based Man In The Middle Attack? is web based phishing? to prevent it?
SSE architecture SSL verifier
Chapter 1 Computer Network Foundation IP Addresses
In the mid-1990s, the Internet is a dramatically dierent network than when it was rst established in the early 1980s. Today, the Internet has entered the public consciousness as the worlds largest public
Routers and Gateways
Network of Networks
A network of networks.
Formally, a collection of arbitrarily connected Autonomous Systems (AS). AS is a set of routers managed under a single admin.
Transport Layer Protocols
TCP and UDP - by Dijiang Huang
Layered Protocol review UDP TCP ICMP
Standard Layered Architecture
OSI Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physi
What is it? Why do we need it? - by Dijiang Huang
Domain name vs IP address
Machine Friendly 188.8.131.52
User Friendly Hierarchical Canonical name: en4028086.eas.asu.edu Alias: dj.eas.asu.edu
What types of technologies or topologies are used in LANs?
Why do we have LANs?
People that work together, talk together. People who are close together talk more than people who are farther apart Locality of Refe