29 research outputs found

    Router security effect on performance of a network

    Get PDF
    Recently many of the devices that create a computer network offer security to help protect networks from hackers, such as computers, servers, firewalls and even routers. In most cases when protecting a network from hackers having more security is not always the best, because the more resources of the device is used by the security in inspecting connections, and it can compromise performance of the network. This thesis investigates performance benefit of having security on a router and its impact on the connection rate of the network when it is under security attacks. In this thesis, different security features and configurations offered by the router are tested to see how they affect the connection rate of the network under different security attacks, and compare with the benchmark network performance when there was no security used at all in the router

    Diplomado de profundización CISCO.

    Get PDF
    Se comienza analizando el planteamiento y obteniendo una topología lógica, según las necesidad de cantidad de usuarios, conexiones, y uso de la red; para luego continuar configurando los parámetros básicos de seguridad y direccionamiento de cada router y switch, así como los parámetros básicos de servicios y direccionamiento de los PC y servidores, pasando por el enrutamiento dinámico, DHCP, NAT, hasta listas de control de acceso ACL. Primero se tiene una red WAN con 3 routers con interfaces Ethernet y Serial, en donde primero se configuran los routers con configuraciones básicas y de contraseñas, además del direccionamiento, luego se desarrollan verificación de dispositivos vecinos, rutas, y conectividad en ciertos tramos, para luego configurar el protocolo de enrutamiento dinámico EIGRP, el cual permite que exista conectividad en todos los tramos, allí también se verifican vecinos EIGRP y se verifican las tablas de enrutamiento, para verificar que se agregaron rutas dinámicamente por EIGRP con el indicativo D; luego, una vez que se cuenta con conectividad total, se restringen ciertos paquetes, para implementar seguridad en la red, en donde ciertas redes LAN no pueden acceder a otras, excepto al servidor ubicado en una de esas LAN, esto se logra al implementar listas de control de acceso ACL, en ciertas interfaces, en determinadas direcciones, y a determinados protocolos y servicios. Adicionalmente se tiene una red MAN, la cual accede a internet en la oficina central, por medio de una red Ethernet; allí se implementan políticas de seguridad un poco más fuertes, incluso desde la configuración básica de los routers, al implementar acceso con usuarios y contraseñas, un máximo de intentos para acceder, un máximo tiempo de permanencia, y un servidor tftp para hacer backups de cada router remotamente, también, se establece autenticación en el protocolo de enrutamiento dinámico OSPF al tener que configurar una misma contraseña en cada interfaz que se conecta con el vecino OSPF el cual deber tener configurada la misma contraseña; en esta red se configura un router como servidor DHCP solo para 2 de las 3 redes LAN; también se configura NAT para traducir las direcciones de la MAN, a una dirección IP global interna (publica), con la cual se accede a internet, implementando NAT y PAT; y finalmente se aplican listas de control de acceso ACL, principalmente a fin de que cada VLAN solo acceda a terminados sectores y servicios.It begins by analyzing the problem and the logical topology, according to the need of number of users, connections, and use of the network; and then configuring the basic security and addressing parameters of each router and switch, as well as the basic services and addressing parameters of the PCs and servers, through dynamic routing, DHCP, NAT, up to ACL access control lists. First there is a WAN network with 3 routers with Ethernet and Serial interfaces, where first the routers with basic configurations and passwords are configured, in addition to the addressing, then, continue with verification of neighboring devices, the routes, and connectivity are verified in certain sections, to then configure the EIGRP dynamic routing protocol, which allows full connectivity in all sections, there, the EIGRP neighbors are verified and routing tables are verified, to verify that routes were dynamically added by EIGRP with the callsign D; then, once full connectivity is available, certain packets need to be restricted to implement network security, where, certain LAN networks cannot access others, except to the server located on one of those LANs, this is achieved by implementing of lists ACL access control, on certain interfaces, on certain addresses, and on certain protocols and services. Additionally, there is a MAN network, which accesses the Internet in the head office, through an Ethernet network; there, a little stronger security policies are implemented, even from the basic configuration of the routers, when implementing access with users and passwords, a maximum of attempts to access, a maximum time of permanence, and a tftp server to make backups of each Router remotely, then, also establishes authentication in the OSPF dynamic routing protocol by having to configure the same password on each interface that it's connects to the OSPF neighbor, which must be the same password configured; then, in this network a router is configured as a DHCP server only for 2 of the 3 LAN networks; NAT is also configured to translate the addresses of the network MAN, to an internal (public) global IP address, with which the internet is accessed, implementing NAT and PAT; and finally ACL access control lists are applied, mainly so that each VLAN only accesses to a determinate sectors and services

    CYBER SECURITY @ HOME: The Effect of Home User Perceptions of Personal Security Performance on Household IoT Security Intentions

    Get PDF
    This study explored potential human factors predictors of home user security intentions through the lens of past performance, perceived self-efficacy, and locus of control. While perceived self-efficacy and locus of control are elements in several organizational and individual security models, past performance has been less frequently studied. The variable, past performance, which has been referred to in other studies as prior experience, knowledge, and information security awareness, is usually a single question self-assessment of familiarity or comfort with technology. This study explores user technical prowess in further depth, using formal technical education, informal technical education, employment in an IT/CS field, and self-reported email and internet security measures as a measurement of technical ability. Security intentions were determined by best practices in hardware security, network security, and IoT device protection. Studying IoT security in home users is important because there are 26.6 billion devices connected to the Internet already, with 127 devices are being added to the network every second, which creates a very large attack surface if left unsecured. Unlike organizations, with dedicated IT departments, home users must provide their own security within their network. Instead of building security around the user, this research attempts to determine what human factors variables effect intentions to use existing security technologies. Through an online survey, home users provided information on their background, device usage, perceived ability to perform security behaviors, level of control over their environment, current security intentions, and future security intentions. Hierarchical linear regression, path modeling, and structural equation modeling determined that past performance was consistently the strongest predictor of security intentions for home users. Self-efficacy and locus of control had varying results among the disparate methods. Additionally, exposure to security concepts through the survey had an effect on user security intentions, as measured at the end of the survey. This research contributed an initial model for the effects of past performance, self-efficacy, and locus of control on security intentions. It provided verification for existing self-efficacy and locus of control measurements, as well as comprehensive, modular security intentions survey questions. Additionally, this study provided insight into the effect of demographics on security intentions

    Use of locator/identifier separation to improve the future internet routing system

    Get PDF
    The Internet evolved from its early days of being a small research network to become a critical infrastructure many organizations and individuals rely on. One dimension of this evolution is the continuous growth of the number of participants in the network, far beyond what the initial designers had in mind. While it does work today, it is widely believed that the current design of the global routing system cannot scale to accommodate future challenges. In 2006 an Internet Architecture Board (IAB) workshop was held to develop a shared understanding of the Internet routing system scalability issues faced by the large backbone operators. The participants documented in RFC 4984 their belief that "routing scalability is the most important problem facing the Internet today and must be solved." A potential solution to the routing scalability problem is ending the semantic overloading of Internet addresses, by separating node location from identity. Several proposals exist to apply this idea to current Internet addressing, among which the Locator/Identifier Separation Protocol (LISP) is the only one already being shipped in production routers. Separating locators from identifiers results in another level of indirection, and introduces a new problem: how to determine location, when the identity is known. The first part of our work analyzes existing proposals for systems that map identifiers to locators and proposes an alternative system, within the LISP ecosystem. We created a large-scale Internet topology simulator and used it to compare the performance of three mapping systems: LISP-DHT, LISP+ALT and the proposed LISP-TREE. We analyzed and contrasted their architectural properties as well. The monitoring projects that supplied Internet routing table growth data over a large timespan inspired us to create LISPmon, a monitoring platform aimed at collecting, storing and presenting data gathered from the LISP pilot network, early in the deployment of the LISP protocol. The project web site and collected data is publicly available and will assist researchers in studying the evolution of the LISP mapping system. We also document how the newly introduced LISP network elements fit into the current Internet, advantages and disadvantages of different deployment options, and how the proposed transition mechanism scenarios could affect the evolution of the global routing system. This work is currently available as an active Internet Engineering Task Force (IETF) Internet Draft. The second part looks at the problem of efficient one-to-many communications, assuming a routing system that implements the above mentioned locator/identifier split paradigm. We propose a network layer protocol for efficient live streaming. It is incrementally deployable, with changes required only in the same border routers that should be upgraded to support locator/identifier separation. Our proof-of-concept Linux kernel implementation shows the feasibility of the protocol, and our comparison to popular peer-to-peer live streaming systems indicates important savings in inter-domain traffic. We believe LISP has considerable potential of getting adopted, and an important aspect of this work is how it might contribute towards a better mapping system design, by showing the weaknesses of current favorites and proposing alternatives. The presented results are an important step forward in addressing the routing scalability problem described in RFC 4984, and improving the delivery of live streaming video over the Internet

    Digital help service opportunities for communication service providers in the convergent digital home

    Get PDF
    Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, February 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 97-100).Homes are becoming increasingly connected as new technologies allow users to access media and information from any-device at anytime. Notebooks, HDTVs, smartphones, media servers, photo cameras, and video cameras, all form part of this new digital ecosystem where - the vision says - information and content will flow easily across devices, enabled by simple and intuitive user interfaces. These new home technologies are, however, often too complex for most users. Only "digital-natives" or technology savvy groups have the necessary skills, knowledge or confidence to adopt them and to use them effectively. For the rest, trying them becomes painful and frustrating. Moreover, the ecosystem itself adds confusion, given the large number of players involved and the many different kinds of relationships. Unless a dominant player gains enough power to establish a dominant digital home architecture, or this happens in some other way, most companies will continue to innovate around device-specific features that don't address the overall complexity of the complete systems that users have to work with. Digital help services can assist users by simplifying the selection, installation, learning and troubleshooting of new services and devices; facilitating the adoption of new convergent technologies. There is a broad range of potential services, including, for example, 'over the top' (OTT) television integration, smartphone mentoring services, WiFi network configuration and desktop support services. Communication service providers should pay close attention to digital help services as an opportunity to differentiate their offer, strengthen their relationship with end-customers, reduce customer support costs and simplify the adoption of bandwidth-intensive technologies. Moreover, digital help services can speed up the adoption of OTT television services, and companies can use them strategically. The technology help space is evolving and communication service providers need to figure out how they want to participate: offer help services themselves; partner or acquire a existing technology support company; and/or create an open marketplace for technology help services.by Juan Spiniak.S.M.in Engineering and Managemen

    Co-productions of technology, culture and policy in North America's community wireless networking movement

    Get PDF
    This thesis investigates the visions and realities of community WiFi's social and political impact, examining how communication technology and social forms are co-produced and providing a communication studies perspective on the transformation of social visions of technology into technological, social, and policy realities. By following the development of local WiFi projects and the emergence of broader policy-oriented mobilizations, it assesses the real outcomes of socially and politically progressive visions about information and communication technologies (ICTs). The visions of advocates and developers suggest that community WiFi projects can inspire greater local democratic engagement, while the realities suggest a more subtle bridging of influence from community WiFi actors into policy development spheres. The thesis describes local WiFi networks in Montreal and Fredericton, NB, and the North American Community Wireless Networking (CWN) movement as it has unfolded between 2004 and 2007, arguing that its democratic visions of technology and their institutional realities have been integral to the politicization of computing technology over the last four decades. Throughout the thesis, WiFi radio technology, a means of networking computers and connecting them to the internet by using unlicensed radio spectrum, acts as an example of how a technology's material form is co-produced along with its symbolic social and political significance

    Top 10 technology opportunities : tips and tools

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1610/thumbnail.jp

    Range Information Systems Management (RISM) Phase 1 Report

    Get PDF
    RISM investigated alternative approaches, technologies, and communication network architectures to facilitate building the Spaceports and Ranges of the future. RISM started by document most existing US ranges and their capabilities. In parallel, RISM obtained inputs from the following: 1) NASA and NASA-contractor engineers and managers, and; 2) Aerospace leaders from Government, Academia, and Industry, participating through the Space Based Range Distributed System Working Group (SBRDSWG), many of whom are also; 3) Members of the Advanced Range Technology Working Group (ARTWG) subgroups, and; 4) Members of the Advanced Spaceport Technology Working Group (ASTWG). These diverse inputs helped to envision advanced technologies for implementing future Ranges and Range systems that builds on today s cabled and wireless legacy infrastructures while seamlessly integrating both today s emerging and tomorrow s building-block communication techniques. The fundamental key is to envision a transition to a Space Based Range Distributed Subsystem. The enabling concept is to identify the specific needs of Range users that can be solved through applying emerging communication tec

    Thriving in a colder and more challenging climate

    Get PDF
    Hawkridge, D., Ng, K., & Verjans, S. (Eds.) (2011). Thriving in a colder and more challenging climate. The 18th annual conference of the Association for Learning Technology (ALT-C 2011). September, 6-8, 2011, University of Leeds, England, UK. URI:http://repository.alt.ac.uk/2159Here are the proceedings of the 2011 ALT Conference ‘‘Thriving in a colder and more challenging climate’’. Proceedings papers report on a piece of research, possibly in its early stages, or they can be ‘‘thoughtpieces’’ which state a point of view or summarise an area of work, perhaps giving new insights. The conference has six themes: . Research and rigour: creating, marshalling and making effective use of evidence . Making things happen: systematic design, planning and implementation . Broad tents and strange bedfellows: collaborating, scavenging and sharing to increase value . At the sharp end: enabling organisations and their managers to solve business, pedagogic and technical challenges . Teachers of the future: understanding and influencing the future role and practices of teachers . Preparing for a thaw: looking ahead to a time beyond the disruptive discontinuities of the next few years. Interestingly, there were very few proposals for the conference as a whole against the sixth theme: and no proceedings papers. Perhaps the thaw is still perceived as being too far away to warrant any preparation yet!Association for learning technolog
    corecore