SlideShare a Scribd company logo
1 of 29
Ride the Light
A guide to the internet, telephony and computer
technology in the 21st century.




Presentation for MIS-110
November 1, 2005
Presenter: Michelle Davies
Agenda
 Introduction
 Core Computing Values
 Telephony
 Internet Technology
 IP Addressing
 Internet Security/Abuse
 Conclusion
Working Model OSI
(Troubleshooting from the Ground Up)
Base                  0s & 1s
                                     Base   Number System
                                     2      Binary
   The word “base” in math is       3      Ternary
    used to refer to a particular    4      Quaternary
    mathematical object that is      5      Quinary
    used as a building block. The    6      Senary
    most common uses are the
                                     7      Septenary
    related concepts of the number
                                     8      Octal
    system….
                                     9      Nonary
0-9 followed by A-F                  10     Decimal
                                     11     Undenary
                                     12     Duodecimal
                                     16     Hexadecimal
                                     20     Vigesimal
                       0-9           60     Sexagesimal
Call Routing
Phone Systems
   Nortel Centrex
    -maintained by telco, more reliable, more expensive, no
    CPE purchase
   Norstar KSU (Key Systems Unit)
    -customer maintained, cheaper than centrex, has
    limitations, CPE purchase is expensive
   PBX (Private Branch Exchange)
    -also known as a small dms100 switch, performs
    complex call routing – Best Area Call Selection,
    Cheapest Rate Selection
Telco Terminology
   POTS – Plain Old Telephone Service
   FX – Foreign Exchange (Hard & Soft)
   DSL – Digital Subscriber Line
   Telco – Telephone Company
   CPE – Customer Premise Equipment
   PBX – Private Branch Exchange
   KSU – Key Systems Unit
   OOS – Out of Standard / Out of Service
   NID – Network Interface Device, point of demarc.
Dial-up
Dial-up Info
 4 Standards – k56flex, x2, v.90, v.92
 Getting connected at 56Kbps is not impossible but usually unlikely. When
  56k technology first came out, the signal strength required for a 56000 bps
  connection exceeded FCC regulations, so 53,333 bps was the absolute
  maximum. 54,666 bps and 56,000 bps connections are possible, but usually
  very unstable due to fluctuations in the local loop quality. Typically V.90
  connections are in the 40s and are very sensitive to noise in shoddy phone
  lines or passing through several connections, like running the phone through
  a fax machine, an answering machine, a splitter, or even a surge protector.
  The best setup is to use a quality V.90 modem with updated firmware and/or
  drivers connected directly to the wall jack with one short phone cord no
  more than 10 feet in length. Then add devices (like the surge protector) until
  you find the culprit. If this set up still does not allow a V.90 connection, it
  likely has to do with the quality of the phone lines/local loop and needs to be
  taken up with the telephone company.
Source: modemhelp.net
DSL
DSL Info
   Several types of DSL exist, ADSL, SDSL, XDSL
    (to name a few)
   DSL vs. Cable, why DSL is better.
    -Advantages & Disadvantage
   Loop Lengths
   Splitter is placed on phone line to divide
    between voice frequency (lower frequencies)
    and data (higher frequencies)
T1 Technology
T1 Information
   24 Channels each at 64k. Max speed = 1.544
    Mbps
   Sometimes sold as burstable or as fractional
   Customer’s network is connected to t1 via a
    router and CSU/DSU, then there is a PTP circuit
    between customer and ISP, the circuit is
    terminated at the Telco CO via a CSU/DSU and
    a router
ARIN
                There are several routing registries around the world…




   ARIN (American Registry for Internet Numbers) – Covers the U.S. and Canada
   AfriNIC - Responsible for providing vital resource allocation and registration services for the continent of Africa on
    behalf of the Internet community.
   LACNIC - Latin American and Caribbean IP Address Regional Registry. It is responsible for providing vital resource
    allocation and registration services to the Latin American and Caribbean region.
   RIPE NCC - performs activities primarily for the benefit of the membership in Europe, the Middle East, and parts of
    Asia; mainly activities that its members need to organize as a group, even though they may compete in other areas.
   APNIC - serves the entire Asia Pacific region, comprising sixty-two economies in Asia and Oceania.
   Each “NIC” performs critical functions…
   Registration Services pertain to the technical coordination and management of Internet number resources. They
    include:
   IP address space allocation, transfer, and record maintenance
   ASN allocation, transfer, and record maintenance
   Directories
         Registration transaction information (WHOIS)
   DNS (Reverse)
   Every allocation provided to isp’s and end users greater than a /29 must be justified to ARIN by submitting the required
    information to ARIN.
   Without tight controls on address space, we would soon run out as the address pool is finite.
RFCs
 Located at http://www.rfc-editor.org
 RFCs are the protocol standards for the
  internet, networking, routing, etc
 RFCs related to IP Addressing: 1918, 791
 IPv6 vs. IPv4
Subnetting – Class C
       Total # of           Total # of Useable
CIDR      Addresses            Addresses             Subnet Mask

/24                   256                        254 255.255.255.0

/25                   128                        126 255.255.255.128

/26                    64                         62 255.255.255.192

/27                    32                         30 255.255.255.224

/28                    16                         14 255.255.255.240

/29                     8                          6 255.255.255.248

/30                     4                          2 255.255.255.252
Subnetting – Class B
bits   Subnet Mask     CIDR   # Subnets   # Hosts   Nets * Hosts
 2     255.255.192.0   /18       2        16382        32764
 3     255.255.224.0   /19       6         8190        49140
 4     255.255.240.0   /20       14        4094        57316
 5     255.255.248.0   /21       30        2046        61380
 6     255.255.252.0   /22       62        1022        63364
 7     255.255.254.0   /23      126        510         64260
 8     255.255.255.0   /24      254        254         64516
Subnetting – Class A
bits   Subnet Mask   CIDR   # Subnets   # Hosts   Nets * Hosts

 2     255.192.0.0   /10       2        4194302     8388604

 3     255.224.0.0   /11       6        2097150    12582900

 4     255.240.0.0   /12       14       1048574    14680036

 5     255.248.0.0   /13       30       524286     15728580

 6     255.252.0.0   /14       62       262142     16252804

 7     255.254.0.0   /15      126       131070     16514820

 8     255.255.0.0   /16      254       65534      16645636
Today’s Latest Internet Threats
   Threats           Solutions
   Spam              Spam Filtering at ISP
   Viruses            level or 3rd Party Software
   Trojans           Anti Spyware Programs
   Phishing          Pop Up Stoppers
   Spyware           Anti Virus Programs
   DDOS Attacks      Basic Computer Literacy
   Pop Ups
Security Threats (detail)
   Spam -- In general, spyware is any technology, such as tracking software, that aids in gathering
    information about a person or organization without their knowledge.

   Viruses -- A program or piece of code that is loaded onto your computer without your knowledge and
    runs against your wishes.

   Trojans -- A destructive program that masquerades as a benign application. Unlike viruses,
    Trojan horses do not replicate themselves but they can be just as destructive.

   Phishing – (fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established
    legitimate enterprise in an attempt to scam the user into surrendering private information that will be used
    for identity theft.

   Spyware -- Any software that covertly gathers user information through the user's Internet connection
    without his or her knowledge, usually for advertising purposes.

   DDOS Attacks -- Short for Distributed Denial of Service, it is an attack where multiple compromised
    systems (which are usually infected with a Trojan) are used to target a single system causing a
    Denial of Service (DoS) attack.

   Pop Ups -- A type of window that appears on top of (over) the browser window of a Web site that a user
    has visited. In contrast to a pop-under ad, which appears behind (in back of) the browser window, a
    pop-up is more obtrusive as it covers other windows, particularly the window that the user is trying to
    read. Pop-ups ads are used extensively in advertising on the Web, though advertising is not the only
    application for pop-up windows.
Websites of Interest
                       Tech Websites
         Name                        Address
DSL Reports               http://www.dslreports.com
Church of the
  Swimming Elephant       http://www.cotse.com
Modem Help                http://www.modemhelp.org
Modem Help                http://www.modemhelp.net
Slashdot                  http://www.slashdot.org
Tech TV                   http://www.g4tv.com
                          http://
IP Subnet Calculator         www.sonicusers.com/tools/ipcalcul
Symantec Security
   Response               http://www.sarc.com/
Websites of Interest (cont).
US CERT (Computer Emergency
Awareness Team)             http://www.us-cert.gov/
Wayback Machine               http://www.waybackmachine.org
RFC Editor                    http://www.rfc-editor.org
                              http://www.internettrafficreport.com/main.
Internet Traffic Report       htm
Traceroute.org                http://www.traceroute.org
Open RBL                      http://openrbl.org
Mail Relay Testing            http://www.abuse.net/relay.html
MAPS                          http://www.mail-abuse.com/
More Websites of Interest
ARIN                      http://arin.net/
CNET                      http://www.cnet.com
Google News               http://news.google.com
Bullguard                 http://www.bullguard.com/news/
Apple                     http://www.apple.com
Microsoft                 http://www.microsoft.com
Microsoft Support         http://support.microsoft.com
Webopedia                 http://www.webopedia.com
Home Network Help         http://www.homenethelp.com
Practically Networked     http://www.practicallynetworked.com
How Stuff Works           http://www.howstuffworks.com
AVG Anti Virus            http://www.grisoft.com/
Ad Aware                  http://www.lavasoftusa.com/software/adaware/
Spybot Search & Destroy   http://www.safer-networking.org/en/download/
Google Pop-up Stopper     http://toolbar.google.com
Urban Legends             http://www.scambusters.org/legends.html

More Related Content

Viewers also liked (7)

NEPA BlogCon 2013 - Content Creation & Management
NEPA BlogCon 2013 - Content Creation & ManagementNEPA BlogCon 2013 - Content Creation & Management
NEPA BlogCon 2013 - Content Creation & Management
 
Catalog WTFs
Catalog WTFsCatalog WTFs
Catalog WTFs
 
End of year show 2011 (Colegio David)
End of year show 2011 (Colegio David)End of year show 2011 (Colegio David)
End of year show 2011 (Colegio David)
 
Ferrados
FerradosFerrados
Ferrados
 
Chia Matt
Chia MattChia Matt
Chia Matt
 
The (mis)adventures of Flat Stanley
The (mis)adventures of Flat StanleyThe (mis)adventures of Flat Stanley
The (mis)adventures of Flat Stanley
 
NEPA BlogCon 2012 - All Things Google
NEPA BlogCon 2012 - All Things GoogleNEPA BlogCon 2012 - All Things Google
NEPA BlogCon 2012 - All Things Google
 

Similar to Ride the Light

A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsAlane Moran
 
Rutgers - RUNet Networking Issues
Rutgers - RUNet Networking IssuesRutgers - RUNet Networking Issues
Rutgers - RUNet Networking IssuesMichael Dobe, Ph.D.
 
IoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & PotentialIoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & PotentialAndri Yadi
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3Ravi Yasas
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSelf Employed
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hackSlawomir Jasek
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Mark Goldstein
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliationGurjan Oberoi
 

Similar to Ride the Light (20)

A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
 
Rutgers - RUNet Networking Issues
Rutgers - RUNet Networking IssuesRutgers - RUNet Networking Issues
Rutgers - RUNet Networking Issues
 
IoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & PotentialIoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & Potential
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
NOTES
NOTESNOTES
NOTES
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX Deloyment
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
 
Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 

More from Michelle Davies (Hryvnak)

NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...
NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...
NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...Michelle Davies (Hryvnak)
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityMichelle Davies (Hryvnak)
 
NEPA BlogCon 2013 - Building a Professional Network in the Digital Age
NEPA BlogCon 2013 - Building a Professional Network in the Digital AgeNEPA BlogCon 2013 - Building a Professional Network in the Digital Age
NEPA BlogCon 2013 - Building a Professional Network in the Digital AgeMichelle Davies (Hryvnak)
 
NEPA BlogCon 2013 - Blog Growth & Development
NEPA BlogCon 2013 - Blog Growth & DevelopmentNEPA BlogCon 2013 - Blog Growth & Development
NEPA BlogCon 2013 - Blog Growth & DevelopmentMichelle Davies (Hryvnak)
 
NEPA BlogCon 2012 - Social Media for Business
NEPA BlogCon 2012 - Social Media for BusinessNEPA BlogCon 2012 - Social Media for Business
NEPA BlogCon 2012 - Social Media for BusinessMichelle Davies (Hryvnak)
 
NEPA BlogCon 2012 - Blogging for Smart People
NEPA BlogCon 2012 - Blogging for Smart PeopleNEPA BlogCon 2012 - Blogging for Smart People
NEPA BlogCon 2012 - Blogging for Smart PeopleMichelle Davies (Hryvnak)
 
Michelle davies cis-180 -maximum transmission unit
Michelle davies   cis-180 -maximum transmission unitMichelle davies   cis-180 -maximum transmission unit
Michelle davies cis-180 -maximum transmission unitMichelle Davies (Hryvnak)
 

More from Michelle Davies (Hryvnak) (20)

NEPA BlogCon 2013 - Blogging 101 (Knepper)
NEPA BlogCon 2013 - Blogging 101 (Knepper)NEPA BlogCon 2013 - Blogging 101 (Knepper)
NEPA BlogCon 2013 - Blogging 101 (Knepper)
 
NEPA BlogCon 2013 - Blogging 101 (Culp)
NEPA BlogCon 2013 - Blogging 101 (Culp)NEPA BlogCon 2013 - Blogging 101 (Culp)
NEPA BlogCon 2013 - Blogging 101 (Culp)
 
NEPA BlogCon 2013 - Google Analytics 101
NEPA BlogCon 2013 - Google Analytics 101NEPA BlogCon 2013 - Google Analytics 101
NEPA BlogCon 2013 - Google Analytics 101
 
NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...
NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...
NEPA BlogCon 2013 - Non-Profits vs. For-Profits in the Game of Social Media, ...
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & Security
 
NEPA BlogCon 2013 - Building a Professional Network in the Digital Age
NEPA BlogCon 2013 - Building a Professional Network in the Digital AgeNEPA BlogCon 2013 - Building a Professional Network in the Digital Age
NEPA BlogCon 2013 - Building a Professional Network in the Digital Age
 
NEPA BlogCon 2012 - Sharing is Caring
NEPA BlogCon 2012 - Sharing is CaringNEPA BlogCon 2012 - Sharing is Caring
NEPA BlogCon 2012 - Sharing is Caring
 
NEPA BlogCon 2013 - HTML5/CSS3 for Bloggers
NEPA BlogCon 2013 -  HTML5/CSS3 for BloggersNEPA BlogCon 2013 -  HTML5/CSS3 for Bloggers
NEPA BlogCon 2013 - HTML5/CSS3 for Bloggers
 
NEPA BlogCon 2013 - Blog Growth & Development
NEPA BlogCon 2013 - Blog Growth & DevelopmentNEPA BlogCon 2013 - Blog Growth & Development
NEPA BlogCon 2013 - Blog Growth & Development
 
BitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed ComputingBitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed Computing
 
A Brief History of NEPA Blogs
A Brief History of NEPA BlogsA Brief History of NEPA Blogs
A Brief History of NEPA Blogs
 
NEPA BlogCon 2012 - HTML 101
NEPA BlogCon 2012 - HTML 101NEPA BlogCon 2012 - HTML 101
NEPA BlogCon 2012 - HTML 101
 
NEPA BlogCon 2012 - Social Media for Business
NEPA BlogCon 2012 - Social Media for BusinessNEPA BlogCon 2012 - Social Media for Business
NEPA BlogCon 2012 - Social Media for Business
 
NEPA BlogCon 2012 - Blogging for Smart People
NEPA BlogCon 2012 - Blogging for Smart PeopleNEPA BlogCon 2012 - Blogging for Smart People
NEPA BlogCon 2012 - Blogging for Smart People
 
NEPA BlogCon
NEPA BlogConNEPA BlogCon
NEPA BlogCon
 
Internet Safety Tips for Children
Internet Safety Tips for ChildrenInternet Safety Tips for Children
Internet Safety Tips for Children
 
Welcome to epix
Welcome to epixWelcome to epix
Welcome to epix
 
Pinterest
PinterestPinterest
Pinterest
 
Michelle davies cis-180 -maximum transmission unit
Michelle davies   cis-180 -maximum transmission unitMichelle davies   cis-180 -maximum transmission unit
Michelle davies cis-180 -maximum transmission unit
 
Pecha kucha michelle-davies
Pecha kucha michelle-daviesPecha kucha michelle-davies
Pecha kucha michelle-davies
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Ride the Light

  • 1. Ride the Light A guide to the internet, telephony and computer technology in the 21st century. Presentation for MIS-110 November 1, 2005 Presenter: Michelle Davies
  • 2. Agenda  Introduction  Core Computing Values  Telephony  Internet Technology  IP Addressing  Internet Security/Abuse  Conclusion
  • 3.
  • 5. Base 0s & 1s Base Number System 2 Binary  The word “base” in math is 3 Ternary used to refer to a particular 4 Quaternary mathematical object that is 5 Quinary used as a building block. The 6 Senary most common uses are the 7 Septenary related concepts of the number 8 Octal system…. 9 Nonary 0-9 followed by A-F 10 Decimal 11 Undenary 12 Duodecimal 16 Hexadecimal 20 Vigesimal 0-9 60 Sexagesimal
  • 6.
  • 8. Phone Systems  Nortel Centrex -maintained by telco, more reliable, more expensive, no CPE purchase  Norstar KSU (Key Systems Unit) -customer maintained, cheaper than centrex, has limitations, CPE purchase is expensive  PBX (Private Branch Exchange) -also known as a small dms100 switch, performs complex call routing – Best Area Call Selection, Cheapest Rate Selection
  • 9. Telco Terminology  POTS – Plain Old Telephone Service  FX – Foreign Exchange (Hard & Soft)  DSL – Digital Subscriber Line  Telco – Telephone Company  CPE – Customer Premise Equipment  PBX – Private Branch Exchange  KSU – Key Systems Unit  OOS – Out of Standard / Out of Service  NID – Network Interface Device, point of demarc.
  • 10.
  • 12. Dial-up Info  4 Standards – k56flex, x2, v.90, v.92  Getting connected at 56Kbps is not impossible but usually unlikely. When 56k technology first came out, the signal strength required for a 56000 bps connection exceeded FCC regulations, so 53,333 bps was the absolute maximum. 54,666 bps and 56,000 bps connections are possible, but usually very unstable due to fluctuations in the local loop quality. Typically V.90 connections are in the 40s and are very sensitive to noise in shoddy phone lines or passing through several connections, like running the phone through a fax machine, an answering machine, a splitter, or even a surge protector. The best setup is to use a quality V.90 modem with updated firmware and/or drivers connected directly to the wall jack with one short phone cord no more than 10 feet in length. Then add devices (like the surge protector) until you find the culprit. If this set up still does not allow a V.90 connection, it likely has to do with the quality of the phone lines/local loop and needs to be taken up with the telephone company. Source: modemhelp.net
  • 13. DSL
  • 14. DSL Info  Several types of DSL exist, ADSL, SDSL, XDSL (to name a few)  DSL vs. Cable, why DSL is better. -Advantages & Disadvantage  Loop Lengths  Splitter is placed on phone line to divide between voice frequency (lower frequencies) and data (higher frequencies)
  • 16. T1 Information  24 Channels each at 64k. Max speed = 1.544 Mbps  Sometimes sold as burstable or as fractional  Customer’s network is connected to t1 via a router and CSU/DSU, then there is a PTP circuit between customer and ISP, the circuit is terminated at the Telco CO via a CSU/DSU and a router
  • 17.
  • 18. ARIN There are several routing registries around the world…  ARIN (American Registry for Internet Numbers) – Covers the U.S. and Canada  AfriNIC - Responsible for providing vital resource allocation and registration services for the continent of Africa on behalf of the Internet community.  LACNIC - Latin American and Caribbean IP Address Regional Registry. It is responsible for providing vital resource allocation and registration services to the Latin American and Caribbean region.  RIPE NCC - performs activities primarily for the benefit of the membership in Europe, the Middle East, and parts of Asia; mainly activities that its members need to organize as a group, even though they may compete in other areas.  APNIC - serves the entire Asia Pacific region, comprising sixty-two economies in Asia and Oceania.  Each “NIC” performs critical functions…  Registration Services pertain to the technical coordination and management of Internet number resources. They include:  IP address space allocation, transfer, and record maintenance  ASN allocation, transfer, and record maintenance  Directories  Registration transaction information (WHOIS)  DNS (Reverse)  Every allocation provided to isp’s and end users greater than a /29 must be justified to ARIN by submitting the required information to ARIN.  Without tight controls on address space, we would soon run out as the address pool is finite.
  • 19. RFCs  Located at http://www.rfc-editor.org  RFCs are the protocol standards for the internet, networking, routing, etc  RFCs related to IP Addressing: 1918, 791  IPv6 vs. IPv4
  • 20. Subnetting – Class C Total # of Total # of Useable CIDR Addresses Addresses Subnet Mask /24 256 254 255.255.255.0 /25 128 126 255.255.255.128 /26 64 62 255.255.255.192 /27 32 30 255.255.255.224 /28 16 14 255.255.255.240 /29 8 6 255.255.255.248 /30 4 2 255.255.255.252
  • 21. Subnetting – Class B bits Subnet Mask CIDR # Subnets # Hosts Nets * Hosts 2 255.255.192.0 /18 2 16382 32764 3 255.255.224.0 /19 6 8190 49140 4 255.255.240.0 /20 14 4094 57316 5 255.255.248.0 /21 30 2046 61380 6 255.255.252.0 /22 62 1022 63364 7 255.255.254.0 /23 126 510 64260 8 255.255.255.0 /24 254 254 64516
  • 22. Subnetting – Class A bits Subnet Mask CIDR # Subnets # Hosts Nets * Hosts 2 255.192.0.0 /10 2 4194302 8388604 3 255.224.0.0 /11 6 2097150 12582900 4 255.240.0.0 /12 14 1048574 14680036 5 255.248.0.0 /13 30 524286 15728580 6 255.252.0.0 /14 62 262142 16252804 7 255.254.0.0 /15 126 131070 16514820 8 255.255.0.0 /16 254 65534 16645636
  • 23.
  • 24. Today’s Latest Internet Threats  Threats  Solutions  Spam  Spam Filtering at ISP  Viruses level or 3rd Party Software  Trojans  Anti Spyware Programs  Phishing  Pop Up Stoppers  Spyware  Anti Virus Programs  DDOS Attacks  Basic Computer Literacy  Pop Ups
  • 25. Security Threats (detail)  Spam -- In general, spyware is any technology, such as tracking software, that aids in gathering information about a person or organization without their knowledge.  Viruses -- A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.  Trojans -- A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.  Phishing – (fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.  Spyware -- Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.  DDOS Attacks -- Short for Distributed Denial of Service, it is an attack where multiple compromised systems (which are usually infected with a Trojan) are used to target a single system causing a Denial of Service (DoS) attack.  Pop Ups -- A type of window that appears on top of (over) the browser window of a Web site that a user has visited. In contrast to a pop-under ad, which appears behind (in back of) the browser window, a pop-up is more obtrusive as it covers other windows, particularly the window that the user is trying to read. Pop-ups ads are used extensively in advertising on the Web, though advertising is not the only application for pop-up windows.
  • 26.
  • 27. Websites of Interest Tech Websites Name Address DSL Reports http://www.dslreports.com Church of the Swimming Elephant http://www.cotse.com Modem Help http://www.modemhelp.org Modem Help http://www.modemhelp.net Slashdot http://www.slashdot.org Tech TV http://www.g4tv.com http:// IP Subnet Calculator www.sonicusers.com/tools/ipcalcul Symantec Security Response http://www.sarc.com/
  • 28. Websites of Interest (cont). US CERT (Computer Emergency Awareness Team) http://www.us-cert.gov/ Wayback Machine http://www.waybackmachine.org RFC Editor http://www.rfc-editor.org http://www.internettrafficreport.com/main. Internet Traffic Report htm Traceroute.org http://www.traceroute.org Open RBL http://openrbl.org Mail Relay Testing http://www.abuse.net/relay.html MAPS http://www.mail-abuse.com/
  • 29. More Websites of Interest ARIN http://arin.net/ CNET http://www.cnet.com Google News http://news.google.com Bullguard http://www.bullguard.com/news/ Apple http://www.apple.com Microsoft http://www.microsoft.com Microsoft Support http://support.microsoft.com Webopedia http://www.webopedia.com Home Network Help http://www.homenethelp.com Practically Networked http://www.practicallynetworked.com How Stuff Works http://www.howstuffworks.com AVG Anti Virus http://www.grisoft.com/ Ad Aware http://www.lavasoftusa.com/software/adaware/ Spybot Search & Destroy http://www.safer-networking.org/en/download/ Google Pop-up Stopper http://toolbar.google.com Urban Legends http://www.scambusters.org/legends.html