Monday, May 31, 2021

Tech Topic Network Management

 


Network management can be defined as the ability to monitor, manage, and respond to anything inside your network, causing the network to not work correctly for any clients. Hynes 2019 states that there are five primary functions in network management: detecting the problem, isolating the problem, troubleshooting the problem, and documenting what was don’t to correct the problem. Several different items are included in your network, including clients, servers, access points, firewalls, switches, and routers. Furthermore, there are several types of networks, with the most common being WAN, WLAN, and LAN. However, depending on the network level you are monitoring, you may only have access to your LAN or WLAN. Throughout network management, several key fundamentals of Information Technology have been taught throughout this course.

            First, network management is the critical component of keeping it all together in the information technology field. Knowing how all things in the network work together, such as the hardware, software, applications, and computing devices will make managing the network more effortless. If you do not understand some fundamental basics, you will not be able to manage the network correctly.

            Next, network management relies on the hardware of the computing systems to report information correctly to troubleshoot the problems within the network and show when the network is running efficiently. Network performance is measured using metrics like throughput, uptime and downtime, error rates, percentage utilization, response time, and latency. This data is primarily collected using SNMP (Simple Network Management Protocol), without which we couldn’t identify devices, monitor network performance, or keep track of changes to the network (Hynes, 2019).

            Furthermore, one of the programming languages commonly used in network management is Python. This open-source programming language is the top choice of the open-source community. Network admins use Python for automating system administration tasks. It can be operated using plugins and scripts to integrate into various workflows.

            In addition to programming language, software plays a crucial role in network management. Several applications and software-based programs will allow you to manage everything within your network to include the transmission pieces of your signal flow. I am familiar with the program SolarWinds. SolarWinds lets you trace packets, monitor switches, routers, and traffic. Having this ability through intelligent software makes monitoring your network reliable and straightforward. In recent history, SolarWinds has been shown to have vulnerabilities to allow outside intruders to get information about your network configuration and security. As with anything in technology, the correct security protocols must be implemented once a vulnerability in the network has been identified. Gartner Inc, 2021, has several alternative monitoring tools available other than SolarWinds, such as Nagios, Microsoft, and ManageEngine. Knowing all your software and application options is just as crucial to make sure you have the capabilities need to manage and protect your network.

            By the same token, network security and network architecture are crucial elements of network management. Understanding what services you are providing and how the information flows through the network will better manage the network. Knowing how data is routed through the network allows me to troubleshoot network hardware and software problems as a communicator. For instance, if I can do a traceroute and get all my routers aren’t responding, I can pinpoint where the network error occurs. Likewise, network security is essential to prevent personally identifiable information from being leaked. The information within your network should be protected. You must ensure you have the correct hardware and software on your network to monitor threats and vulnerabilities. All networks have vulnerabilities; our job at the network management level ensures we have the appropriate policies and procedures to prevent unrepairable damage.


          In summary, effectively managing your network relies on your ability to understand the fundamentals of Information Technology. Knowing how all components of hardware, software, applications, security, and monitoring tools work together will allow you to manage your network effectively. Stephen Nappo 2021 said it best “Technology trust is a good thing, but control is a better one.”

   

References

Contributor, S. (2021, April 19). Network Management Guide: How To, Best Practices, & Tools - DNSstuff. Software Reviews, Opinions, and Tips - DNSstuff. https://www.dnsstuff.com/network-management

Gartner, Inc. (2021, February 3). Top SolarWinds Competitors and Alternatives - Gartner 2021 - IT Infrastructure Monitoring Tools. Gartner. https://www.gartner.com/reviews/market/it-infrastructure-monitoring-tools/vendor/solarwinds/alternatives

Hynes, A. (2021, February 16). Network Management: What It Is and How It Works - Auvik Networks. Auvik Networks Inc. https://www.auvik.com/franklyit/blog/network-management-for-msps-nutshell/

 

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Friday, May 28, 2021

Network Security

 


Security within networks is the most crucial aspect of ensuring that a network operates at an optimal level and ensuring that no personally identifiable information is leaked online. Both information and system security are essential to an individual and an organization. To the individual, if you allow someone to get personal information from you by either phishing or other means, it could leave you vulnerable to bank fraud and identity theft, among lots of other things. For the organization, it is crucial to ensure system security to make sure intruders outside of the network cannot get into and disable or harm the systems of operation. Furthermore, depending on the information classification, there is a possibility of information causing a threat to national security. Typically organizations have a wealth of information about employees and dealings within the company that, if not controlled, could cause harm to the employees and the organization as a whole. There are several ways to ensure you are not vulnerable such as passwords, education, and anti-virus software. Many types of attacks can harm your network, and I will be discussing two of them: phishing and security holes and vulnerability. First, phishing is defined as a fraudulent attempt by attackers to gain sensitive information by the impersonation of a reputable source using email or other online communication (PhishingTackle.com, 2021). Typically, someone trying to launch a phising attack will impersonate an organization by making themselves look credible. They will most likely try to make the email or phone call look and sound just like it would if a bank were to call you or ask for your information. However, the best way to defend against phishing is through education. Most banks or companies will not ask for your personal information or account numbers via email or phone call. Typically, you would reach out first and provide them that information. It is crucial for people inside an organization to verify emails before clicking links within an email. I have personally seen phishing attacks where they act as an IT department and Page 3 ask for specific information about individuals and organizational policies. Phishing does not just have to be about money; it could also be about getting information that could harm the organization or company. To this day, there is no 'catch-all' method for stopping phishing; one must remain vigilant at all times and treat all emails and websites with caution when online (PhishingTackle.com, 2021). Now that we have discussed phishing, let's discuss security holes and vulnerabilities. In its simplest term, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies (What Is Network Security, 2021). Having network security will allow you to mitigate your vulnerabilities within your network. Scanning your network regularly using either hardware or software to check for vulnerabilities is crucial. If you leave yourself susceptible to attacks, it will be easier for the intruder to get inside the network. Furthermore, you can set specific rules within the systems to make them even more fortified— little things such as complex passwords or changing your password every thirty days. There also encryption devices that you could utilize to make it harder for the adversary as well. In summary, you must educate your users within your network. It is also essential that you constantly monitor your network for vulnerabilities and make sure you prevent and many security issues as possible. Martina Navratilova said it best "security used to be an inconvenience sometimes, but now it's a necessity all the time."


Jelen, S. (2021, May 25). Social Engineering: What Is It? Types of Social Engineering Attacks 

and How to Protect Yourself from Them. Security Trails. 

https://securitytrails.com/blog/social-engineering-attacks

PhishingTackle.com. (2021, January 6). Phishing: What is it and how does it affect me in 2021?

Phishing Tackle. https://www.phishingtackle.com/phishing/

Rungta, K. (2021, May 22). DoS (Denial of Service) Attack Tutorial: Ping of Death, DDOS. 

Guru 99. https://www.guru99.com/ultimate-guide-to-dos-attacks.html

What is Network Security? (2021, May 6). Forcepoint. https://www.forcepoint.com/cyberedu/network-security

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from 

zybooks.zyante.com/

Computers in the Workplace



 I have chosen to discuss network infrastructure within the military. Military networks have been going through multiple changes over the years to keep up with the ever-changing information environment for warfighting.


                Computers play a vital role in military networks and daily operations. While running a Communications Operations Center, you will have several computers running different applications for certain warfighting functions. You will most likely see an application for fires, chat, and command and control of the operational area. Furthermore, the military uses computers daily for checking email, sending reports, and accountability of people and equipment.


                Employees must be computer literate in the military. I believe that gone are the days where you say you don’t need a computer to fight a war. These days everything is virtualized to include video feeds, targeting, surveillance, and common operation pictures. If you cannot have a basic understanding of computer operation, your value in the military will be severely reduced. We currently use various applications, software, hardware, and peripherals daily.


                The leadership of DOD has believed for some time that global communications technology, epitomized by the Internet and the World Wide Web, will fundamentally transform the conduct of war in the 21st century just as airpower transformed it between World Wars I and II (Committee on Network Science, 2005). Over the next ten years, I see the military becoming even more advanced. We are currently competing with some of our near-peer aggressors to maintain momentum in the cyber warfare battlespace. There will be an advancement in networks, applications, weapons, and aircraft that will tie them into some type of military network. The Marine Corps alone had stood up several units to assist with this to include Marine Corps Cybersecurity Command and the 1st Network Battalion. The Cyberspace domain is so important that the Secretary of Defense recognized the significance of the cyberspace domain to national security and directed the establishment of U.S. Cyber Command (USCYBERCOM) as a sub-unified command under U.S. Strategic Command (USSTRATCOM) (Marine Corps Cybersecurity Command, 2018).

                As in any industry, as times change, so will the technology. To remain relevant In any industry, we have to maintain our awareness of the most current computer technology to make us as efficient as possible.


Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/


Committee on Network Science for Future Army Applications; Board on Army Science and Technology; Division on Engineering and Physical Sciences; National Research Council. (2005, May 1). Read “Network Science” at NAP.edu. The Network Academies Press. https://www.nap.edu/read/11516/chapter/5

Smith, B. (2018, November 12). Technology and the US military. Microsoft On the Issues. https://blogs.microsoft.com/on-the-issues/2018/10/26/technology-and-the-us-military/ (Links to an external site.)

U.S. Marine Corps Forces Cyberspace Command. (2018, February 5). About Us. https://www.marforcyber.marines.mil/About/

Traveling Through a Network



 A computer communicates via the Internet by sending a packet containing information like an address for a destination computer, the data size, and the data itself (email message, web page, piece of video, etc.) ( Vahid & Lysecky 2017). Typically, the packet will travel through your ISP via a router or switch, depending on the destination address of the information. Looking in-depth at my ping test, it seems at the beginning; all traffic follows the same path. I am assuming that the last IP, which is 65.99.53.35, is most likely the last Ip before it goes outside the ISP network. If you look at the types, they are pretty similar worldwide no matter what destination you are trying to hit. I would say the main reason for this is the availability of fiber almost worldwide. I am currently stationed in Japan, and we have one gb of speed.

In my current job, we use tracert and ping tests quite often. Once we have configured the network and assume all commands are correct, we start pinging things within our known network. A real-life example was recently when we could not ping our call manager or our server stacks, yet we could get outside the network. We had established adjacency with the network providing services. We could ping external websites and certain things inside the network but not everything. We realized by doing a tracert and going through configurations is that we had an incorrect IP address assigned to an encryption device. Without having these tools, it would have been difficult to understand why we were having issues within our network.

There a few reasons why your ping test and tracert would fail when running the test. Some of the issues you could encounter are the ISP is down, a DNS is down, or an offline website. When you run the test, and it times out, something between the host and destination is unreachable. Depending on your access to the network, that is where you can begin to troubleshoot connectivity issues.

 

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

 

ping tracrt google.PNGping tracrt google-1.PNG    ALIXPRESSPING.png  

A Day in the Life

 I consider myself an experienced user in most Microsoft Office Applications. I have had to use them throughout most of my life and career daily. I typically use Microsoft Powerpoint when I want to present a brief or some type of classroom instruction. I also think that you can utilize all applications of Microsoft together when necessary. An example that I can use is that I was building a program for a retirement ceremony, and I need to use a feature from each application. Once I completed the project, I then converted it to a PDF file and sent it off to print. Having a thorough knowledge of how all the applications can work together will benefit you on all future projects. Each application has both advantages and disadvantages. Microsoft word is limited in what it can do when it comes to processing data. For instance, if I wanted to create a budget, I do not wish to use Microsoft Word, rather Microsoft Excel would be the preferred choice. However, if I wanted to present a word picture of my budget or present the information to a crowd, I could use Microsoft Powerpoint. For documenting my day, I think Microsoft Word was the best application for actual documentation. However, If I wanted to evaluate my day and see where I could improve with time management, Microsoft Excel would be the best application. I think another scenario that Microsoft Word is good for is taking notes or organization of thoughts. I have used Word many times to takes notes in either a meeting or class in bullet format. I also think that Word is an excellent application for writing essays and grammar checking. You can synchronize your Grammarly account with Word, which allows you to check it immediately on your computer while preparing your classwork. Lastly, Word is an excellent tool for both resume-building and collegiate level papers.


Application Review

 


The application that I have chosen to review is Magic Sing Karaoke. My family and I use this application quite frequently as we all enjoying letting the world know how awful our musical voices are, minus our daughter. This application is a requirement to be able to use our Magic Sing Karaoke microphones.

First, I should cover the good things about the current version of the application. I think the amount of songs that you can choose from over 300,000 is sufficient. It seems that they are updated with some pretty popular songs of today's music listeners and even have plenty of ballads from the past. I do like that once you get through the challenges of getting it connected to the television, you can record your performances to help you get better with your song's timing. Lastly, one of my favorite parts of the applications is that I can add songs while others are singing to keep the party going all night long.

There are several things about this application that I would like to see improved. First, the functionality overall is complicated. There is no ability to connect the microphones via Bluetooth to your TV or your application. To connect the microphone, you have to scan a QR code which then allows you to connect. When first downloading the application, it brings up multiple applications in different countries, so finding the one you need can be complicated.

The application should include a son search option by artist, genre, and tempo. Currently, the application is just a matching search feature, top 100, and recommended song. Currently, you have to scroll through all of the 300,000 songs in alphabetical order if you do not know the exact name or artist of the song. I would even suggest that the application have a catalog built-in where the songs are listed by number, and you could enter the number, and the song pops up. I understand a search feature is expensive to build, but having a filter option would help the user select a song quickly. At a minimum, the first one would allow users more and make it more enjoyable to sing vs. spending so much time scrolling through alphabetical order that others cannot join because they don't know songs. If you can make the filtration of songs more user-friendly, people who purchase the application would enjoy the application and equipment more.

Lastly, I would suggest allowing users to have the ability to get voice/lyric assistance. Currently, in the application, certain songs can give voice assistance. If you could provide that option for all songs, it would enhance the user's ability to stay on time with the music.  Currently, you have to have a pretty strong understanding of timing and tone to follow the song while it is playing in the application.


Coding


 Using Scratch was my first experience with any type of coding at all. My daughter loves coding and has taken many classes on it, but I am more into network architecture. I found the scratch website, for the most part, to be very user-friendly. I was at first having some difficulties in understanding how some of the different blocks worked. However, I overcame these obstacles by going through the plethora of tutorials that the website offers. One of the insights gained from using this program was that whatever you tell the program to do is what it is going to execute. I find it similar to when I build networks. If I make an error in a network internet protocol address and point something in the wrong direction, my network most likely will have errors. I found that I had to keep verifying every layer of Scratch to ensure everything was aligned correctly. There are several types of computer languages that you can use: Python, Javascript, and assembly language. All the languages have different inputs for the system you use to understand what action needs to occur. The higher the language level, the more precise you can be with what you want the application or machine to do. I think that each language has its own purpose. Machine language can be used when trying to figure out certain addresses on the internet or figure out a range of internet protocol addresses on a specific network. Other languages can be used to program websites or configure routers, switches, and servers. In my opinion, the most popular language is Python. I have seen that used on multiple websites that I use daily. Mainly, I have seen it used on military websites that require us to either use embedded PowerPoints or testing applications.

Overall, the experience with Scratch and with coding was a learning experience. It is something that I do not do daily and was interesting to learn. As we grow in the class, I think some of the things I have not been taught throughout my network experience will be utilized in my future.

Please see my link below to see my first experience. 

https://scratch.mit.edu/projects/525573065

Structured Programs

Development of Structured Programs A data structure is a technique of storing and organizing information so that it may be employed effect...