Research the data rates supported by the following Ethernet variants:
Protocol | Data rate |
---|---|
Ethernet | 10Mbps |
Fast Ethernet | |
Gigabit Ethernet | |
10 Gigabit Ethernet |
We connect our devices to the Internet and the Internet connects them all together. But what is the Internet made of? We say it interconnects all the devices, but how?
Network devices are mainly hubs, switches or routers. There are lots of other specialist bits, but the bulk of the interconnectivity is done by switches and routers. In this course you have looked at client server models, web requests and emails. What do these messages look like and how are they sent?
For each type of communication over the network there are a set of rules and specifications as to what format and order the information is sent. These are called protocols and they are fundamental in understanding how the Internet works.
This Packet Tracer lab explores the devices and protocols used in computer networks. You will need:
Companies do not store a user’s passwords in clear text – they send it through a scrambling algorithm to produce a 'hash', and the hash is then saved. The hash algorithm does not work in reverse, so you can't unscramble a hash to get the original password. When you enter your password the site uses the same algorithm to make a hash, which it then compares to the hash saved against your details.
Some sites allow you to store password hints, and they save these as clear text. Adobe was hacked in 2013, and its hashed passwords and hints were stolen for thousands of customers. The hackers looked at all the hints that gave the same hash (hence were the same password). Because they had lots of hints for the same password it was easy to guess what they were.
Can you guess the passwords used in this puzzle based on the stolen hints?
For more information, take a look at the following resources.
Now it’s time to test what you’ve learned in a quiz.
Grateful acknowledgement is made to the following sources:
Figure 1: Birmingham City University (BCU)
Figure 2: Birmingham City University (BCU)
Figure 3: Cisco
Figure 4: Birmingham City University (BCU)
Figure 5: Birmingham City University (BCU)
Figure 6: CommScope. This file is licensed under the Creative Commons Attribution-Noncommercial-NoDerivatives Licence http://creativecommons.org/ licenses/ by-nc-nd/ 2.0/
Figure 7: tlsmith1000. This file is licensed under the Creative Commons Attribution-Share Alike Licence http://creativecommons.org/ licenses/ by-sa/ 2.0/
Figure 8: Bull3t Hughes. This file is licensed under the Creative Commons Attribution-Share Alike Licence http://creativecommons.org/ licenses/ by-sa/ 2.0/
Figure 9: Cisco
Figure 10: Cisco/Birmingham City University (BCU)
Figure 11: Cisco/Birmingham City University (BCU)
Figure 12: Cisco/Birmingham City University (BCU)
Figure 13: Cisco/Birmingham City University (BCU)
Figure 14: Cisco/Birmingham City University (BCU)
Figure 15: Cisco
Figure 16: Cisco/Birmingham City University (BCU)
Figure 17: Cisco/Birmingham City University (BCU)
Figure 18: Cisco/Birmingham City University (BCU)
Figure 19: Publisher unknown
Figure 20: Cisco/BCU
Figure 21: Birmingham City University (BCU)
Figure 22: Birmingham City University (BCU)
Figure 23: Birmingham City University (BCU)
Figure 24: Birmingham City University (BCU)
Figure 25: Birmingham City University (BCU)
Figure 26: Publisher unknown
Figure 27: Screenshot taken from Barclays, example of phishing.
Every effort has been made to contact copyright holders. If any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity.