|
@@ -5,7 +5,7 @@
|
5
|
5
|

|
6
|
6
|

|
7
|
7
|
|
8
|
|
-[Verano 2016 - Ive - Tatiana - Rafa]
|
|
8
|
+
|
9
|
9
|
|
10
|
10
|
When working with arrays, two common tasks are searching for data and sorting the data using a certain order, ascending or descending, alphabetically or numerically. To efficiently carry out these tasks, searching and sorting algorithms are used. One simple searching algorithm is linear search. Two well known sorting algorithms are Selection Sort and Bubble Sort. In this laboratory experience, you will complete an application to monitor network flow to practice the implementation of algorithms for searching and sorting.
|
11
|
11
|
|
|
@@ -53,7 +53,7 @@ Internet addresses are stored on 4 bytes (32 bits), normally presented to users
|
53
|
53
|
|
54
|
54
|
Port numbers are stored on 2 bytes (16 bits). Therefore, port numbers range from 0 to 65535. Some port numbers assigned to known service applications are: 22 for `ssh`, 23 for `telnet`, 25 `smtp`, 80 for `http`.
|
55
|
55
|
|
56
|
|
-The application that you will see today can be used to monitor what is known as NetFlows. One NetFlow is composed of the aggregation of the packets of an unidirectional communication between the the applications of two computers. For instance, a NetFlow can be composed of the packets used to send the information from your browser to the `http` application of the web server running Moodle.
|
|
56
|
+The application that you will see today can be used to monitor what is known as NetFlows. One NetFlow is composed of the aggregation of the packets of an unidirectional communication between the applications of two computers. For instance, a NetFlow can be composed of the packets used to send the information from your browser to the `http` application of the web server running Moodle.
|
57
|
57
|
|
58
|
58
|
|
59
|
59
|
Figure 1 shows the interface for the *Network Analyzer* application.
|
|
@@ -66,7 +66,7 @@ Figure 1 shows the interface for the *Network Analyzer* application.
|
66
|
66
|
|
67
|
67
|
---
|
68
|
68
|
|
69
|
|
-Each row in the table in Figure 1 is a NetFlow composed of the source and destination address, the source and destination port, the number of packets and the number of octets (8 bits) in one unidirectional communication between the source and destination computer, from the source port to the destination port.
|
|
69
|
+Each row in the table in Figure 1 is a NetFlow composed of the source and destination address, the source and destination port, the number of packets, and the number of octets (8 bits) in one unidirectional communication between the source and destination computer, from the source port to the destination port.
|
70
|
70
|
|
71
|
71
|
The application that you will complete gives the user the ability to analyze the status of the network. Among others it allows to:
|
72
|
72
|
|