Monday, January 29, 2024

Network Management

 

What is Network Management?

           Network Management is the process of administrating and monitoring your network to keep it running smoothly (Iwuozor & Bottorff, 2023). Network administrators use tools, processes, and skills to guarantee the network runs efficiently and securely for users to be able to access easily (IBM, N.D.). Network management is broken down into five major categories to determine how networks are monitored and maintained:

  • Fault Management – minimizes downtime by isolating and resolving network faults or errors.
  • Configuration Management – maintains control by tracking routers, servers, switches, and firewalls, including configuration details to make changes while reducing errors.
  • Performance Management – monitors the speed, availability, and quality of service on the network.
  • Security Management – Protects the network from unauthorized access and threats by using firewalls, encryption, and authentication.
  • Accounting Management – monitors network metrics like bandwidth usage, storage consumption, and device access for accounting and billing purposes.

Information Technology and Network Management

           Information Technology is the study or use of systems for storing, sending, and retrieving information. Computers have been around since the 1940s and were used for performing calculations for military purposes (Vahid & Lysecky, 2019). Computers used to be the size of rooms with switches that are now the size of a pinhead (Vahid & Lysecky, 2019). Moore’s law states that switch size will reduce by half every two years, allowing computers to shrink in size (Vahid & Lysecky, 2019). 

Moore’s law is why computers have become so portable and popular that billions of them are connected. The Internet connects billions of computers using communication rules considered Internet Protocols (Vahid & Lysecky, 2019). A network of computers is a group of computers that share resources, usually located in one location. The Internet connects computers all over the world, which is considered the network of networks. The growth in computer usage has contributed to the growth of Information Technology jobs, including network management.  

 

Computer Hardware and Network Management

           Computer hardware is the physical parts of a computer (Vahid & Lysecky, 2019). The Central Processing Unit (CPU) is the brain of the computer and is the hardware that controls the other hardware on the computer by running program instructions (Vahid & Lysecky, 2019). You need powerful CPUs for processing huge amounts of network traffic and monitoring data to ensure efficient network operations. Memory random access memory (RAM) holds data temporarily to help the CPU run programs faster by copying small amounts of data from the drive on the RAM (Vahid & Lysecky, 2019). Having enough RAM will allow quick responses to network events because it has enough temporary data storage to process efficiently.

Application software, databases, and programming

           Programming is the four types of instructions that the CPU understands, including input, add, output, and stop (Vahid & Lysecky, 2019).  The CPU is the brain of the computer and is important for the network to run smoothly. Application software is a program designed to perform different tasks.  Network management uses Whatsup Pro to monitor websites and servers’ uptime and performances. It also uses application software like LANDesk that monitors installed systems and patches/updates operating systems.  

Influences on Network Management

           The right network design and layout controlled by the management rules and policies, all while fixing security issues and patches before they become an issue, keeps everything working well. Network management plays a key role in connecting computers and sharing resources smoothly, which allows these networks to connect all over the world, which is what the network of networks called the Internet. 

           

References:

 

IBM (N.D.). What is Network Management? IBM. https://www.ibm.com/topics/network-management

Iwuozor, J. & Bottorff, C. (2023, September 7). What is Network Management? Definition and Best Practices. Forbes Advisor. What Is Network Management? Definition And Best Practices – Forbes Advisor

Ren, J. & Li, T. (N.D.) Michigan State University. Chapter 12 Network Management.  network-management.pdf (msu.edu)

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

 


Network Security

 


The increasing use of technology has risks for potential hackers to access your personal information.  When you use the internet, you leave electronic footprints that don't just keep a record of your posts but your activities that can be collected, used, or sold for good intentions but mainly bad intentions (Vahid & Lysecky, 2019).  Computers can be vulnerable to attacks, including security holes like distributed denial-of-service attack (DDoS), password cracking, email scams, and phishing.  Best practices to prevent your computer from vulnerabilities by installing and maintaining up to date antivirus, enabling a firewall to prevent unwanted communications with other devices, regularly scanning your computer for viruses or bugs, update often and install genuine software.   

Phishing Attacks and Password Cracking

 Phishing attacks are usually emails with links that look like emails from businesses or banks, but the link will send you to a site that looks real, but when you put in your information, it saves it.  Phishing attacks can also install malware when you click on the link inside the email (Bhardwaj, Chandok, Bagnawar, Mishra, & Uplaonkar, 2002).  These attacks are hard to catch if you're not paying close attention to small details.  The best way to avoid this is to never click on the link in an email if they are asking you to verify the information and sign into the site from a web browser.  These attacks are typically untraceable unless the malware slows down your computer or the account that you thought you logged into and shows signs of activities you aren't responsible for.  Another way to prevent someone from learning your passwords is to refrain from writing them down or saving them on your computer notes or documents.  Also, avoid having the same password for many accounts because if a hacker cracks one password, they have access to all your accounts.  If a hacker found a way to install spyware and use the information, they found to figure out your passwords.  

DDoS Attack

    In a distributed denial of service attack (DDoS), a personal computer or organization's online services are unavailable by flooding the internet traffic from multiple sources (Gaurnag, 2023).  The ping of death is a common (DDoS) attack using the command prompt to send multiple information requests to a computer or server, making it impossible to get information online.  The best way to prevent these types of attacks is to have a firewall software, or hardware that prevents unauthorized communication to other computers on a network (Vahid & Lysecky, 2019). 

Conclusion

    Computers on the internet are connected to everyone by the network and are at risk of many different threats.  Making sure you keep up to date antivirus and firewall software, running scans for viruses and bugs often, keeping software up to date and only genuine software is installed on your computer are best practices to prevent your computer from vulnerabilities.  Also using strong passwords that are changed often, don't use words or names, are not used for multiple sites, and are not written down will protect you from someone finding or figuring out your login information.  Being connected to the network allows access to lots of information and will enable people to track and steal your personal information.  

References:

Bhardwaj, A., Chandok, S. S., Bagnawar, A., Mishra, S., & Uplaonkar, D. (2022). Detection of Cyber Attacks: XSS, SQLI, Phishing Attacks and Detecting Intrusion Using Machine Learning Algorithms. 2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT), Computing, Power and Communication Technologies (GlobConPT), 2022 IEEE Global Conference On, 1–6. https://doi.org/10.1109/GlobConPT57482.2022.9938367

Chen CL, Lai JL. An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort. Sensors (Basel). 2023 Jul 4;23(13):6139. doi: 10.3390/s23136139. PMID: 37447987; PMCID: PMC10346265.

Cybersecurity & Infrastructure Security Agency. (2022, December 18). 4 Things That You Can Do To Keep Yourself Cyber Safe.  https://www.cisa.gov/news-events/news/4-things-you-can-do-keep-yourself-cyber-safe

Gaurnag, J., (2023, August 10). Vulnerability management, its impact and threat modeling methodologies.  IBM Security Intelligence. 

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks. Chapter 7 and 8.

Computers in the Workplace: Food Service/Retail



          Information Technology has changed how our personal and professional lives operate daily.  The food/retail industry uses apps to promote deals, save money, keep track of rewards, order for pick up or delivery, and even different payment options.  Some places have self-checkout to help reduce lines or allow people to avoid conversations.  The food industry uses computers for people to order or place orders on their devices that automatically show up on computers in the kitchen- allowing people to make orders how they want, which is easy to read and consistent in format or order to speed the making process.  Everyone must be computer literate to order food or pay for items independently.  Employees need to know how to use these computers to help customers and be able to make food or ring up customers.  Most of the computers in this field are set up for quick and easy use.  For example, a POS (point of sales) computer has clearly labeled buttons for items to ring up and shortcut buttons for cash amount options.  Companies will update systems daily or weekly, removing or adding product options but also update to fix bugs and update software.  The kitchen monitors usually have fewer buttons like tap to silence the order and usually do this when they are about to make it.  The buttons would include:

  • A bumping button to remove the order from the screen.
  • A button to recall an order in case it needs to be remade.
  • A button or option to hit screen to silence order when it comes in.  
    The kitchen computers can track how long it takes to make orders and sometimes shows if you keep orders within a goal wait time.  This information can help companies improve customer goals, keep track of inventory, look for food trends to help know how much food to have on hand, and so much more.  Registers can keep track of all sales and refunds and even require a login to prevent people from stealing or tracking errors for training purposes.  The registers can be linked to an electronic safe, keeping track of the amount of money being dropped and protecting money from people trying to steal.  The electronic safe keeps money safe by only allowing the company like Brinks to have access to the safe minimizing the amount of access to the safe less likely the money is stolen.  If employees or customers can operate the devices correctly, that can prevent the business from losing money or having inaccurate data, including inventory and cash.

In 10 years, registers will be replaced with tablets, and there will be no more cash sales.  Local servers will no longer be necessary because the tablets, order points, and other computers will use WIFI and update to corporate servers directly.  Customers can scan and pay with their phones, minimizing the number of employees focused on ringing customers.  Operating systems will have stronger security, and the devices will be smaller.  Tablets will have small attachments that can process cards or take Samsung or Apple Pay.  

Traveling Through a Network: Ping and Tracert

    Ping tracing is used to check connection issues between a network and an IP address or server using a utility tool (Okta, 2022).  Data is sent in packets that can take different routes or hops to get to their destination (Okta, 2022).  Ping shows if the packet was sent and how long it took to be sent.  Traceroute builds upon ping but also gives you names of IP addresses of each piece of equipment that the packet travels through.  To access these tools all you need to do is search on windows for command prompt and open it.  Once the command prompt is open all you have to do is type ping and the website you want to check.  If you want to know the hops the packet of information passes through, then type the command tracert then the website.  Tracert will show three ping times for each hop the packet is delivered to.  When I pinged google.com it responded with the quickest time since it is our closest region compared to google.ca or google.jp.  The tracert command will send 3 packets of information giving three different ping times.  I can see that a different route is used to each destination and some of those hops have regional names that I can recognize.  Google.com went to a local Washington D.C. networking device while google.ca and google.jp traveled through a Culpeper Virgina networking device.  I can also clearly see that google.jp and google.ca take longer to reply because of their distance geographically.  However, the greater geographic distance does not mean that the packet travels through more networking hops, only that it took longer for the packets to travel to the destination and back again.  Using ping and tracert commands has helped me understand how packets of data travel through many network hops until it reaches its intended destination.  

    For troubleshooting purposes, ping can be used to consistently test one's connectivity to a reliable site and if you are getting a lost packet response you can then use the traceroute command to see where those packets are getting lost.  Providing this information to your internet providers tech support will help guide them to where the issue is occurring.  Time out error messages can be caused by many things, but most commonly malfunctioning network equipment, wireless interference, or equipment was just too busy to respond at that moment.  







References:

Okta. (2022, April 21). Ping Trace Techiniques for Network Connectivity Troubleshooting. Ping Trace Techniques for Network Connectivity Troubleshooting | Okta


Microsoft Office: Documenting a Day

 


    

      Microsoft Office basics consist of Word, Excel, and PowerPoint while Microsoft Professional Office can include the basics along with Publisher and Access.  Microsoft Word is a word processor application for creating formatted text, which includes font, size of text, color, margins, and much more (Vahid & Lysecky, 2019).  Microsoft Excel is a spreadsheet application that has tables of data including text, numbers, formulas, and more to show data (Vahid &Lysecky, 2019).  Excel can also be used to create forms that data changes based off the data imputed into the form.  Microsoft PowerPoint is a presentation application used to create a slideshow with text, pictures, and animation (Vahid & Lysecky, 2019).  Microsoft Word is best for creating papers like essays, books, cover letters, resumes, and other documents that mainly use words.  Excel is best for keeping track of finances, orders, product information, making labels, order forms, and much more.  PowerPoint is the best to use for enhancing a presentation by limiting text to important phrases, using pictures to help the audience see what you are talking about, and using animation to enhance the key takeaway text.  I used all three Microsoft Office applications to make a journal of my daily activities.  For my journal of the day Word allowed me to share most of the information about my day in greater detail.  Excel allowed me to see how I spent my time during the day but not in as much detail about my whole day.  Excel would be great if I wanted to find a way to manage my time better on a daily but also weekly or monthly time frames.  PowerPoint would be my first option if I was talking about my day in front of an audience because I could show pictures and key things about my day so they can imagine what it was like.  If someone was to review my PowerPoint about my day, they would miss a lot of details and wouldn't get the whole story if I wasn't presenting it to them.  Microsoft Office programs all have different ways to present information you are trying to share.  Microsoft Word is the best for long text information like essays and journals while Excel is great for charts and keeping data.  PowerPoint is best for presentations using pictures, animation, and a little text to help the audience take more information away from your speech.  

References:

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks. Chapter 5.

University of New York. (N.D.). Microsoft Office. University of New York. https://subjectguides.york.ac.uk/it-essentials/office


Mobile Application Critique: Sheetz Rewards

     



         A rewards application that I use on my phone almost every day is the Sheetz app. This user-friendly app allows customers to order online, redeem points or other offers, save points, keep track of points, pay with gift cards digitally, and much more. Allowing location access to the application will give you more options, such as paying at the pump when you're at a Sheetz location. Once you pull to a pump, you open the application, and at the top are a few options that only work if you are located at a Sheetz location, including pump gas. Select the pump gas option and enter the pump number to confirm card information. Then, you are given a code to enter at the pump and can start filling up. This prevents card information from being stolen by scammers using skimmers or other devices. Another option that appears at a Sheetz location is scan and go, which allows you to scan all your items as you grab them and pay with a card all on the application. This allows you to skip the lines to pay for your products unless you need age-restricted items. The application has your rewards card information on it, as well as the ability to add or change the rewards cards without losing any of your points. To access your card, rewards, and offers, all you do is click on the circle in the bottom middle that says My Sheetz REWARDS. You can order food and convenience items to have ready for pickup or curbside or have them delivered by DoorDash by clicking the order button on the left side of the My Sheetz REWARDS button. The more sections are your personal information, settings, find a location, subscriptions, nutrition, jobs, and more useful information. Employees get more from the application, like being able to see how much money they used for the month of the 10% discount they get on everything up to one thousand dollars per month. Employees also get 50% off all items with Sheetz's name on them or made in the kitchen as long as they are on the clock. Registering their Sheetz cards as employee cards and hitting a button on the register automatically takes off all qualifying items for 50% off. The design of the application helps people clearly see what they rank as a fan, friend, or freak and how many spendable points they have. Some of the options people may only know about if they are told, like if they enable location settings, they can do more with the application. For the most part, the application uses pictures and colors to match the store's theme and isn't too busy unless it's on the main screen. It can be overwhelming when offers appear, which happens often. The application is designed to give customers offers and deals but other ways to make their experience fast, friendly, and different from other gas stations/ restaurants. The application can be slow or doesn't always load from time to time. Normally, those are fixed within an hour or so of having difficulty with the application, but only if the normal closing of the app completely and reopening doesn't fix the issue. To get started, you need to create an account with a username and password and fill out other personal information. Some recommendations to help improve this application would be a way to see detailed transactions of all payments made using that rewards card or payment card on file. This can help customers verify that orders were correct or verify transactions that were theirs and not stolen. Also, make sure that the prices or deals were taken off correctly because sometimes the system has the wrong pricing information. Another recommendation is updating the application more often to help fix bugs that cause people to be unable to log into their accounts because it doesn't recognize their information even when it is correct. The other reason to update more often is to update the security of the application because it has so much personal information. According to the U.S. Department of Homeland Security, "Mobile phones are becoming increasingly valuable as targets for attacks because of all the sensitive personal information on them."(Ruggiero & Foote, N.D.) Keeping up with the latest threats, updating the application to fix bugs, and using encryptions for all the data, especially personal information, will help protect customers from hackers and scammers. Lastly, having an option to make the application easy for anyone to use or allowing customers to hide options that they won't use would help some customers. There are customers who only use it for the rewards and earn the points to redeem those rewards. Making the payment options, ordering online, and scan and go not options they are interested in. They could open the application and show the options they use most often. Overall, I feel that the Sheetz application is one of the best rewards and online ordering apps around.  

References:

U.S. Department of Homeland Security. (2011). Cyber Threats to Mobile Phones. [US-CERT]                 cyber_threats_to_mobile_phones.pdf  (cihttps://www.cisa.gov/sites/default/files/publications/cyber_threats_to_mobile_phones.pdfsa.gov). 

Sheetz Inc. (2013). Sheetz. (Version 8.0.0.205961). [Mobile App]. App Store. https://play.google.com/store/apps/details?id=com.ust.sheetzretapp

Saturday, January 27, 2024

Programming Languages (Scratch)



    

       Programming Languages are written machine code with a set of formal rules that make computers execute tasks they are being told to do (Alves, J., Neto, A., Pereira, M., & Henriques, P., 2023).  Strach is a kid-friendly programming language that helps kids make videos, games, and much more using more of our language and automatically having it translate into machine codes.  Strach was easy to use and made a short video of a rooster with chicks walking around.  I also included questions like what your name is, with a reply showing like you're having a conversation.  It was challenging to figure out all the options under control, and I kept playing with them all until I figured it out.  Using Strach showed how easily errors in code can occur.  Although there is less typing involved with Strach, you can still move the block to the wrong area or select the wrong block of code.  In the textbook activities I did in ZyBooks, it was easier to make typing errors, causing the input to provide the wrong output.  Machine language uses 1s and 0s and understands four instructions written with 1s and 0s: input, add, output, and stop (Vahid & Lysecky, 2019).  Assembly language is a text way to help humans understand and write in machine language (Vahid & Lysecky, 2019).  A high-level language uses high-level instructions like formulas that use a compiler to convert the instructions into assembly/machine languages (Vahid & Lysecky, 2019).  Other than Strach, I found Python to be the most straightforward programming language to use because the formulas are easy to understand, which helps you be able to repeat.  A software programmer would use machine language because the computer needs the program written in 1s and 0s to provide output when commands are used.  High-level languages are primarily used in most workplaces, making learning and writing computer commands to give output or different outputs easier.  The most popular high-level languages are Python or JavaScript because most companies state one as a requirement for some IT positions.  They are easy to learn and use because they use more human language than machine language.  

My Scratch video: Are you my father? on Scratch (mit.edu)

To learn about the popular programming languages, visit this link: The 10 Most Popular Programming Languages to Learn in 2023 (northeastern.edu)

References:

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Alves, J., Neto, A., Pereira, M., & Henriques, P.  (2023). Characterization and Identification of Program languages. SLATE. https://drops.dagstuhl.de/opus/volltexte/2023/18527/pdf/OASIcs-SLATE-2023-13.pdf.

Fourment, M., & Gillings, M. R. (2008). A comparison of common programming languages used in bioinformatics. BMC bioinformatics, 9, 82. https://doi.org/10.1186/1471-2105-9-82

Network Management

  What is Network Management?            Network Management is the process of administrating and monitoring your network to keep it runnin...