Sunteți pe pagina 1din 22

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Academic Summary

This paper presents how they work and what is the use that is given to
the network devices such as the Hub, Swicht and the router as well as some software that
allow you to set security on the network.
The switch is a second-level device, which are responsible for the interconnection of
computers within the same network, or what is the same, are devices which, along with the
wiring, constitute the local area network or LAN. To the swich is also known as the switch
and its specifications follow the standard known as Ethernet (IEEE 802.3) or technically. The
switches only perform this function for repairing. When the connection is done wirelessly
the device responsible for this is called a wireless access point.

The switch is possibly one of the devices with a higher level of scalability. There are four-
port switches with basic functions to cover small needs of interconnection. But we can also
find switches with hundreds of ports and with some very advanced features and
characteristics, one of these features is Power Over Ethernet Power over Ethernet (), also
known as PoE, is a technology that allows the sending of power along with the data in the
wiring of an Ethernet network. The first version of this technology was published in the
IEEE 802.3af standard in 2003 and in the year 2009 was published a revision and expansion
in the IEEE 802.3at.

PoE technology allows you to provide power to devices connected to an Ethernet network,
simplifying the cabling infrastructure for its operation. A device that supports PoE get both
data and power over the Ethernet network cable.

Router or router

The term router could be translated as router or router. From the point of view of the
telematics, a router is a network device used to join networks together and route data
between them. It's as simple as that. Join networks is the basic function associated to
a router. However, the evolution of the networks and the Internet has evolved also to the
routers by adding more features to the same.

Router vs. switch

The two interconnect devices are routers and switches . It is important to distinguish clearly
the role of interconnection in each one of them.

The switches transferring data between devices located within the same network.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Routers transfer data between devices that are located on different networks, i.e.,
transfer data between different logical networks.

"Hybrid" devices

Indeed, today there are switches with routing capabilities, called 3-level switches, and
there are routers that include multiple Ethernet ports states doing the functions of
a switch, for example residential routers usually include 4 Ethernet ports, that is to say,
a 4-port switch.

Routers and Internet

As we have said, when we speak of a router all over the world has in mind the router that
we have at home and that provides us with access to the Internet, however, from the point
of view of the interconnection, this type of routers are the most simple since they only have
to join two networks, the network with the operator's network.

However, when we look at companies and organizations with large communications


infrastructures, the picture is quite different as it exponentially increases both the traffic
that is exchanged as a number of networks to be interconnected. The same is true with the
companies that provide connectivity, i.e., ISPS, operators and big carriers. Their networks
are extremely complex and require that the exchange of data between networks is fast,
efficient, with a high level of availability and flexibility. Well, in these cases, the routers must
be devices fast, efficient and intelligent. In these cases, the role of the "routing" of the data
becomes the most priority.

The Hub

A network hub or a repeater hub is a device that is used to connect multiple devices through
or crossover cables fibra ptica, and making it work as a single network segment.
Hubs operate at the physical layer (layer 1) modelo OSI and works as a sort of a multiport
repeater. The hub repeaters are also involved in the collision detection, sending a signal of
congestion to all ports if it detects one of these collisions. The availability
of switches network at very low prices, have left the hub quite obsolete, although you can
still see in some older facilities or is certain situations where it has preferred to put one of
these devices.

Network Security Software

Today, the security in networks is an important element, that is why


you use some software such as John The Ripper, Nmap, chkrootkit, among others to
provide security of access and content in the networks.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Introduction

Today, computer networks are of great use and importance in the world, that is why,
in this work we will present some devices that are of great use and usefulness for the
operation of a network. The HUB, was one of the first devices that were used to connect
wired networks, its operation today is day is very scarce and practically no longer used in
modern networks. The switch, this device was the one who replaced the tasks to the Hub,
with the advantage that today there are switch intelligent and high-security device and
technology. The Router, this device is widely used in networks both local and wide-area, is
the one who allows the link between multiple networks as well as give you a speedy and
accurate traffic information that is transmitted through a network. It is of great utility.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

The switch

The interconnect devices have two areas of activity in the telematic networks. In a first level
are the most well-known, routers , which are responsible for the interconnection of
networks. On a second level would be the switches, which are responsible for the
interconnection of computers within the same network, or what is the same, are devices
which, along with the wiring, constitute the local area network or LAN.

A switch is a device used to connect computers on a network forming what is known as a


local area network (LAN) and whose specifications are still the standard known as Ethernet
(IEEE 802.3) or technically.

In reality switches are not the only elements responsible for the interconnection of devices
on a local network. The switches perform this function for repairing. When the connection
is done wirelessly the device responsible for this is called a wireless access point.
At present, the local wired networks continue to the Ethernet standard (virtually 100 %)
which uses a star topology and where the switch is the central element of the topology.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

The switch is possibly one of the devices with a higher level of scalability. There are four-
port switches with basic functions to cover small needs of interconnection. But we can also
find switches with hundreds of ports and with some very advanced features and
characteristics

What is a Switch?

The basic function of a switch is to unite or connect devices in a network. It is important


to be clear that a switch does not provide alone connectivity with other networks, and
obviously, it provides connectivity to the Internet. To do this you will need a router.

Basic characteristics of the switches

Ports

The ports of the switch are the elements that allow the connection of other devices at the
same. Such as a PC, laptop, router, another switch, a printer, and in general, any device that
includes an Ethernet network interface. The number of ports is one of the basic
characteristics of the switches. Here there is a fairly broad range, from small 4 port switches
to switches that support several hundreds of ports.

The Ethernet standard supports basically two types of means of transmission wiring: the
twisted pair and fiber optic cable. The connector used for each type of course is different
so that another fact to bear in mind is that type are the ports. Basic switches normally only
have ports of twisted pair cable (which connector is known as RJ-45) and the most
advanced fiber-optic ports (the connector is most commonly used, although not the only
one is the type SC).

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Speed

Given that Ethernet allows multiple speeds and means of transmission, another of the
features on the ports of the switches is precisely the speed at which they can work on a
given transmission medium. We can find ports defined as 10/100, that is to say, that they
can run under the 10BASE-T (with a speed of 10 Mbps) and 100BASE-TX (speed: 100 Mbps).
Another possibility is to find 10/100/1000, that is to say, in addition to the
standard 1000BASE-T (1000 Mbps speed). You can also find ports that use optical fiber
using sockets in any format for fiber optics. There are port 100BASE-FX, and 1000BASE-X.

Finally, high performance switches can provide ports that comply with the standard 10GbE,
in both fiber and UTP cable.

Modular Ports: GBIC and SFP

Most of the switches of mid and high ranges offer the so-called modular ports. These ports
really have no specific connector if they are connected to a module that contains the port.
In this way we can adapt the port media type, and speed we need. It is common practice
for suppliers to offer different types of modules with RJ-45 or fiber-optic cable. The modular
ports provide flexibility in the configuration of the switches.

There are two types of modules to connect to the modular ports: the first type of module
that appeared is the GBIC module (Gigabit Interface Converter) designed to provide
flexibility in the choice of the transmission medium for Gigabit Ethernet. Later appeared the
module SFP (Small Form-factor Puggable) which is somewhat smaller than GBIC (in fact also
called mini-GBIC) and which has been used by the manufacturer to offer modules both
Gigabit and 10GbE in fiber or UTP cable.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Modular SFP and GBIC ports

Power Over Ethernet

Power Over Ethernet Power over Ethernet (), also known as PoE, is a technology that
allows the sending of power along with the data in the wiring of an Ethernet network. The
first version of this technology was published in the IEEE 802.3af standard in 2003 and in
the year 2009 was published a revision and expansion in the IEEE 802.3at.

PoE technology allows you to provide power to devices connected to an Ethernet network,
simplifying the cabling infrastructure for its operation. A device that supports PoE get both
data and power over the Ethernet network cable.

Devices that use this feature are Wi-Fi wireless access points, IP video cameras, VoIP
phones, remote switches and, in general, any device that is connected to an Ethernet
network, you do not have a very high energy consumption and that their physical location
makes the installation of wiring.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

In the market we can find a multitude of models that include switches with PoE ports. In
these ports we can connect a device that supports this feature and you will receive the
power supply by the own Ethernet cable.

Operation of a switch: switching

The basic function that performs a switch is known as switching and consists in transferring
data between the different devices on the network. To do this, the switches processed the
information contained in the headwaters of the Ethernet frame.

At present there are already versions of Ethernet that can cover distances of tens of
kilometers per what Ethernet is not only used in local networks but can also be used in
metropolitan area networks (MAN)

Without going into much detail in the Ethernet operation, we can say that Ethernet is a
technology for transmitting data for local wired networks that divides the data that is to be
flashed into frames and each frame is added to a specific call control header information.
The header contains the MAC address of both the sender and the receiver.

The switches are stored in a table the MAC addresses of all connected devices along with
the port on which are connected, so that when it reaches a frame at the switch, the pattern
is sent to the appropriate port.

Buffers

The key element in the switches to perform the switching process are the buffers, which
are areas of memory where the frames are stored before being forwarded to the
corresponding port. This feature allows the switch to connect ports that work at different
speeds.

The buffers can be implemented at the outlet of the ports, at the entrance of the ports, or
a combination of both. The most common is to deploy them to the output as it is the most
efficient way, achieving rates of close to 98% efficiency.

The buffers are implemented in RAM built into the device circuitry

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Switching Techniques

There are two techniques to carry out the transfer of data between ports on a switch:

Direct forwarding (cut-through). In this technique, when a switch begins to receive


data for a port, it does not wait to read the entire frame for forwarding to the
destination port. As soon as reads the destination address of the frame MAC,
transfer the data to the destination port.

This technique provides delay times quite low, however, has the disadvantage that it can
only be used when the speeds of all ports are the same.

Another problem posed by the cut-through technique, due to its mode of operation, is that
the switches propagate erroneous frames or frames involved in collisions. A possible
improvement to prevent the spread of frames with collisions is to delay forwarding until
you read the first 64 bytes of the frame, because the collisions can occur only in the first 64
bytes of the frame. This improvement however increases the delay time.

Storage and forwarding (Store and Forward). In this case, when a switch receives
data by a port, stores the entire frame in the buffer and then forward it to the
destination port. The use of this technique allows some error checks before being
sent to the port of destination.

The delay time entered is variable since it depends on the size of the plot, even though it is
often superior to that provided by the cut-through technique, however, it is essential to use
this technique when there are ports running at different speeds.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Configuration and management

The basic function of the switches, which is the commutation of Ethernet frames, you do
not need any manual configuration. One of the features included in the standard Ethernet
(IEEE 802.3u) is the autonegotiation. This function allows a dialog to be established
between the switch and any computer that connects to one of its ports to "negotiate" the
parameters of the communication transparently to the user.

However, the advanced features that offer some models (such as for example, the
configuration of VLANS) if you require a manual configuration. The switches that provide
configuration mechanisms and management are referred to as managed switches managed
switches ().

Access to the settings of these switches can do, or by a special port configuration, or by an
internal web service that provides the switch. In the first case, it is necessary to connect a
PC to this port and access through some specific software (such as for example a terminal
program). In the second case it is sufficient to use a web browser on any PC connected to
an Ethernet port on the switch. The access to the configuration interface of
the switch requires that you configure in the same IP address within the range of the
network where it is connected.

Some of the features that are typically include manageable switches and which we will
describe in detail in future articles are:

VLAN management
Monitoring of ports (Port Mirroring)
Link Aggregation / Port Trunking)
IEEE 802.1X security
Control Loops: Spanning Tree

Switches Level 3 and Level 3 / 4

High-end switches used in the trunk of Ethernet networks of medium- and large-scale
projects often provide routing capabilities of IP packets. In this type of switches is known
as 3-level switches. A 3-level switch performs all the functions of the switching of
a switch but also provides IP routing functions. This feature is especially useful
for switches that use VLAN and need to communicate some of their virtual LANS.

In addition, there may be switches that offer features related to functions of level 4, such
as control of ports. These switches are known as switches of level 3 / 4.

The router in the interconnection of networks

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Without a doubt, the routers have become the most popular interconnect devices, thanks
in large measure to be the device that providers of telecommunications services to
residential customers to establish the connection to the Internet. The residential gateway
also includes several additional features that make him so to speak in the central element
of communications in the home.

Router or router

The term router could be translated as router or router. From the point of view of the
telematics, a router is a network device used to join networks together and route data
between them. It's as simple as that.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Join networks is the basic function associated to a router. However, the evolution of the
networks and the Internet has evolved also to the routers by adding more features to the
same. At present we can classify the routers in two major groups:

Access Routers. Are routers used to join two networks, usually the network of a
telecom operator with your customer's network, whether residential or corporate,
and whether to provide Internet access or provide access to other networks. In this
type of routers the role of "routing" is more or less simple because you only have to
exchange data between two networks. On the contrary, they often incorporate
other additional functions such as firewalls, NAT, proxy, load balancing, Wifi

Distribution routers. Are routers that, unlike the previous ones, are connected to more
than two networks. This type of routers if you kept the main function of "route" data
between the various networks to which they are connected and must be prepared to
process a large amount of information. Use routing algorithms to optimize the search for
the most optimal routes for data handling.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Distribution Router Juniper whose main function is to route data


To understand the function of "networks" of the routers should be clear that it is a
network from the point of view of the routing. Generally the term network applies to a
group of interconnected devices. However, for a router, a network is a group of devices
connected to each other but they use the same range of routing. That is to say, the
routers are set in the IP addresses of the devices to determine whether or not they belong
to the same network.

Therefore, for two devices connected to the same physical network can exchange
information, must be configured to belong to the same logical network.

Remember: From the point of view of a router, a network is a group of interconnected


devices that use the same range of routing.

The router to join networks

In the following figure are represented three networks isolated from each other. The first
two are wired networks whose interconnection device is a switch. The third is a wireless
network whose interconnection device is a wireless access point. In all of them indicated
the IP address of each device. The subnet mask for all devices would be 255,255.255.0,
therefore, each physical network has a range of different routing, that is to say, use different
logical networks.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

A belief is that routers are only used to connect separate networks physically, in buildings,
cities or even different countries, however this is not always the case. Within the network
of the same company can have different logical networks on organizational issues, security
or management of the network traffic, so that two computers connected to the same
physical network can belong to different logical networks.

Router vs. switch

The two interconnect devices are routers and switches . It is important to distinguish clearly
the role of interconnection in each one of them.

The switches transferring data between devices located within the same network.
Routers transfer data between devices that are located on different networks,
that is to say, transfer data between different logical networks.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

From a theoretical point of view, these functions are not interchangeable, that is to say,
a switch can never communicate equipment located in different networks and a router can
never communicate computers within the same network. In practice, however, there are
exceptions

"Hybrid" devices

Indeed, the above statement is true only in the theory of networks, since in practice there
are switches with routing capabilities , called 3-level switches, and there are routers that
include multiple Ethernet ports states doing the functions of a switch, for
example residential routers usually include 4 Ethernet ports, that is to say, a 4-port switch.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Other functions of the routers

The routers, in addition to its function as routers, network traffic can provide many other
features. Below we will describe briefly a few of them:

Adaptation of the data between different transmission technologies. The most


typical residential routers that connect residential networks with the networks of
telecommunications operators to provide Internet connection services.
These routers are able to exchange data between the residential user network that
uses technologies that are typical of local networks (Ethernet and Wi-Fi) and the
access network operator, which will use last-mile technologies such as DSL, cable
(HFC) or optical fiber (FTTH).
Provide network configuration parameters. This function is carried out via a service
called DHCP and that greatly simplifies the connection of a device to the network
because all the network parameters are configured automatically. This function has
taken on particular importance in residential networks especially with the tendency
to use wireless devices.
Filtering of data. The filtering of data takes place mainly for security issues. Broadly
speaking, this process is to establish criteria under which data can be passed or not
from one network to another. This filtering function is carried out by an element
known as a firewall.
Network address translation. At present and due to the shortage of IP addresses
virtually all networks use a mechanism of network address translation known as
NAT which allows the use of private addresses in networks connected to the

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Internet. This function is implemented in many cases by routers, especially


in residential routers.
Other identical characteristicsto can be implemented in the router is currently:
o Wireless access point (Wi-Fi)
o Port Redirection
o Proxy Server
o Load balancing/traffic
o Management of VPN connections

Routers and Internet

As we have said, when we speak of a router all over the world has in mind the router that
we have at home and that provides us with access to the Internet, however, from the point
of view of the interconnection, this type of routers are the most simple since they only have
to join two networks, the network with the operator's network.

However, when we look at companies and organizations with large communications


infrastructures, the picture is quite different as it exponentially increases both the traffic
that is exchanged as a number of networks to be interconnected. The same is true with the
companies that provide connectivity, i.e., ISPS, operators and big carriers. Their networks
are extremely complex and require that the exchange of data between networks is fast,
efficient, with a high level of availability and flexibility. Well, in these cases, the routers must
be devices fast, efficient and intelligent. In these cases, the role of the "routing" of the data
becomes the most priority.

Internet itself is considered a great network of networks, that is, a large network formed by
the interconnection of millions of network. Routers have a key role to play in that role of
interconnection. In fact, without the performance and efficiency of the current routers used
in Internet backbone networks (known as core routers), the Internet itself would not be
possible as we know it.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Core Router

What is a hub and how does it work?

A network hub or a repeater hub is a device that is used to connect multiple devices through
or crossover cables fibra ptica, and making it work as a single network segment.
Hubs operate at the physical layer (layer 1) modelo OSI and works as a sort of a multiport
repeater. The hub repeaters are also involved in the collision detection, sending a signal of
congestion to all ports if it detects one of these collisions. The availability
of switches network at very low prices, have left the hub quite obsolete, although you can
still see in some older facilities or is certain situations where it has preferred to put one of
these devices.

What is certain is that a hub is a network device that is not sophisticated at all. The hub does
not manage anything from the traffic that passes through , and any packet that enters a
port is disseminated to all other ports. To be sent each packet by all other ports, there is as
a result collisions - which prevents a smooth flow of traffic. The need for devices to detect
collisions, limit the number of hubs and the total size of the network. Some hubs have
specialized ports that allows them to combine them in a way that may allow
more hubs simply uniting them by cables ethernet, although it is likely that they will
eventually have to use switches to avoid certain network problems.

"Smart" some hubs detect typical problems, such as excessive collisions on individual
ports, and are able to partition this port, disconnecting it from the shared medium. A smart
hub makes finding a problem easier because the indication lights can give us the source of

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

the problem. It also has the advantage of being able to disconnect each network device to
see where this is not affecting you.

There are three different types of hub:

1 - The liabilities - Is a hub that does not require an external source of energy because it
does not regenerate the signal and therefore it is as if it were a part of the cable,
always taking into account the length of the cable.
2 - Assets - Is a hub that regenerates the signal and need an external power supply.
3 - The smart - The hub provides detection of errors, such as excessive collisions, and also
makes it an active hub.

Passive hubs do not amplify the electrical signals from incoming packets before
disseminating them outside of the network. The assets if, on the other hand, perform this
amplification, as could make a repeater. As has been mentioned, it is intelligent hubs do
not provide some additional features that are particularly important for business. Normally
if enracables easily, which means that you can put one on top of another in a rack for such
a function, in a very easy way to conserve space. You can also include remote management
using SNMP.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

In the past, and when the switches were beginning to be popular, hubs were the option
due to its price compared to the cost of switches . However, as has been said before, the
lowering of prices on switches although the hubs can still be useful in some circumstances.
For example, if you want to use a protocol analyzer in a network, the hub can serve as a
mirror for the ports. It is also very useful as an emergency connection in a meeting if there
are several people in a room and a single network. You can connect a multi-port hub and
so all will be able to connect their ordenadores porttiles to have access to the network.

Software for network security

1. John the Ripper: Tool for cracking passwords. It is one of the most well-known and
popular (you also have Windows version). In addition to auto-detect the hash of the
passwords, you can configure it as you want. You can use it in encrypted passwords for Unix
(DES, MD5 or Blowfish), Curberos AFS and Windows. Has additional modules to
include badadas hashes of passwords in MD4 and stored in LDAP, MySQL and others.

2. Nmap: Without a doubt the best program for network security. You can use it to find
computers and services on a network. It is used primarily to scan ports, but this is only one
of its possibilities. It is also able to discover passive services on a network as well as to give
details of the computers discovered (operating system, how long you have been connected,
the software used to run a service, the presence of a firewall or even the mark on the
remote network card). Runs on Windows and Mac OS X as well.

3. Nessus: Tool to find and analyze software vulnerabilities, such as those that can be used
to control or access the data on the remote computer. It also locates passwords by default,
patches are not installed, etc.

4. chkrootkit: Basically is a shell script to allow discover rootkits installed in our system. The
problem is that many current rootkits detected the presence of programs like this to not
be detected.

5. Wireshark: Packet sniffer is used to analyze network traffic. It is similar to tcpdump (then
we are talking about it) but with a GUI and more options to sort and filter. Place the card in
order modo promiscuo to be able to scan all traffic on the network. It is also for Windows.

6. netcat: Tool that allows you to open TCP/UDP ports on a remote computer (then turns
to listen) , associate a shell to that port and force UDP/TCP connections (useful
for transferecias rasteo of ports or bit by bit between two computers).

7. Kismet: Detection system network packet sniffer, and intrusion for 802.11 wireless
networks.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

8. hping: Packet generator and analyzer for the TCP/IP protocol. In the latest versions can
use scripts based on the Tcl language and also implements an engine of strings (strings of
text) to describe the TCP/IP packets, in this way it is easier to understand them in addition
to being able to manipulate it in a way quite easy.

9. Snort: Is a NIPS: Network Prevention System and a NIDS: Network Intrusion Detetection,
able to analyze IP networks. It is used primarily to detect attacks such as buffer overflows,
access to open ports, web attacks, etc.

10. tcpdump: Debugging tool that is run from the command line. Allows you to view the
TCP/IP packets (and others) that is being transmitted or received from the computer.

11. Metasploit: This tool that provides us with information about security vulnerabilities
and allows you to make penetration testing against remote systems. It also has
a framework to make your own tools and is for both Linux and Windows. There are many
tutorials on the web where you explain how to use it.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.


Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

Conclusions

We can conclude that the network devices such as the Hub, Switch and Router, are
a fundamental part in the operation of a network, although today the use of the hub, is very
limited, its replacement the swich is a fundamental device when you want to wired
networks, more when the switch provides different functions such as Power over Ethernet
technology (Power over Ethernet) this is one of the technologies that revolutionized wired
networks as today by tying the information of data as the electric current is sent through a UTP
cable to devices such as access point.

In the same way the router are devices needed to connect local and wide area
networks. Existyen various types of router, but all have one thing in common allow you to ease
traffic on the network and give an address to the packets that are sent over the network.

Rodrigo Navarro. rnnavarro@hotmail.com . Technological University of Panama.

S-ar putea să vă placă și