Posts

Showing posts from January, 2019

Howard Hudson - Week 8 - IPv6

Image
The primary driver for developing a replacement for IPv4 was the dwindling pool of addresses. The Internet Engineering Task Force published RFC2460 in December 1998, which defined IPv6. Instead of 32-bit addresses, IPv6 was build with a 128-bit address field. IPv6 Header Format Theoretically, 340 undecillion (340,282,366,920,938,463,463,374,607,431,768,211,456) is the number of available IPv6 addresses. According to the 2018 IoT report , there are 17 billion devices and 7 billion IoT devices in use. ( Lueth, 2018 ). If we add 24 billion devices each year for 100 years, the sum of devices would only reach 240  billion.  IPv6 pro vides several advantages over IPv4 such as Encapsulating Security Payload, authentication, hopping, source node fragmentation, and Stateless Address Autoconfiguration. The Encapsulating Security Payload protocol ensures confidentiality of shared data  by providing encryption and decryption through a shared key  ( Finjan, 2017 ).  An   A uthentic

Howard Hudson - Week 7 - TCP/IP Security

Secure communication is very important. I can send an email with “Privacy Act of 1974” in the subject line, but anyone who receives (or intercepts) the email can open it and read it. However, using encryption will protect the email from prying eyes by generating an output that is only legible with decryption. Using encryption does not mean that someone cannot steal your data, but it does mean that it is unreadable unless someone has the code (a key) to decipher the data. There are two encryption types: symmetric and asymmetric. Symmetric encryption uses a single key to encrypt and decrypt data. Asymmetric encryption uses two keys (one private key and one public key); one key is to encrypt and the other is to decrypt. Block cypher and stream cypher are subgroups of encryption. Generally speaking, a block cypher encrypts a block of data whereas a stream cypher encrypts individual bits of data. The table below identifies a few of the encryption types Encryption

Howard Hudson - Week 6 - TCP/IP applications

Image
This week we are looking at communication between computers and applications via the internet. Some of the popular protocols are Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Network Address Translation (NAT), Internet Protocol (IP), and Internet Control Message Protocol (ICMP). The most common protocol is the connection-oriented type, which includes TCP. In a nutshell, a connection is created, data is sent, and the connection is terminated.  When I open my browser and press enter to go to a website, my computer (the client), sends a syn chronize packet to the server. The server ack nowledges the syn chronize and sends a synchronize packet back to my computer. In response, my computer replies back with an ack nowledgment. That sequence is called the three-way handshake.  After the session is no longer needed (the data transfer is complete), a four-way communication is made.  The server sends a fin al packet. My computer responds with an ack nowledgement a

Howard Hudson - Week 5 - TCP/IP Protocol

Image
We discussed the digital portion of Ethernet in week 3, which is the  Ethernet frame.  The Ethernet frame resides in  Layer 2 of the Open Systems Interconnection model . Ethernet enables communication between devices that are physically connected within a local area network by using a physical address (MAC address). On the other hand, Transmission Control Protocol/Internet Protocol (TCP/IP) is layer 4 and 3 in the form of a packet. The packets must be put inside of frame in order to leave the LAN. At this point, data is put in a packet and the packet is put inside a frame before it is sent through the internet. Resources Barrera, D. P. (2017, September 18). Ethernet frames and packets: What's the difference? Retrieved January 13, 2019, from https://www.networkworld.com/article/3225865/network-switch/ethernet-frames-and-packets-whats-the-difference.html Meyers, Mike. (2018). CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007), 7th

Howard Hudson - Week 4 - IEEE 802.3 Ethernet Cable Standard

Image
In 1991, the original ANSI/EIA/TIA-568 was published. In 1995, ANSI/TIA/EIA-568-A defined the Category 5 cable followed by ANSI/TIA/EIA-568-B.2, which recognized and defined category 5e twisted-pair cable in May 2001.  In August 2009, TIA-568-C.2 identified the requirements for category 3, category 5e, category 6, and category 6A balanced twisted-pair cabling. In November 2017, ISO/IEC 11801 was released which details cabling that support 25GBASE-T applications. T568A and T568B are the two color codes used for wiring 8-position 8-contact/RJ45 modular plugs. Both wire configurations are allowed under the ANSI/TIA/EIA wiring standards.  Whichever one is used, ensure both ends are the same configuration. Category 5e cable is the only version of category 5 cable that is currently used. Category 5e cable and Category 6 cable are the standards for mainstay applications. Category 7 is the new kid on the block with Category 8 following close behind it. https://planetechusa.com/blog/e