This week we finished up our exercise of how a network traffic works and how messages are sent over the network. We used envelops and assigned people different roles like: server, printer, CPU, wireless device, router, and yea even a Wii. In this exercise again I was a CPU using wireless. Interesting is how wireless devices are all on the same port of a switch unlike Ethernet, printers, servers, and others that have a physical wire running to the switch. From a security standpoint I realized how much more secure it is to have a physical connection to your own port instead of wireless. I was able to see the flow of how my message to the server was sent and received. It was a good exercise and creative in how physically played the parts of each device instead of just drawing them on the board. Although drawing on the board if very useful too.
We also this week discussed the usage of a tool called Wireshark. Wireshark is the world’s foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto standard across many industries and educational institutions. In class we used this tool to packet sniff and capture packets. It was interesting to see how easily you can capture data on a network and analyze what has been captured from which MAC address and IP. Also even allowing to see HTTP sites being visited.
This week I contributed two articles one on how to secure your wireless network using wireshark:
Also this article which was helpful when using my MAC to renew my IP address: