You are on page 1of 5

Republic of the Philippines

Laguna State Polytechnic University

CS4G
Network Simulator

Submitted by:
James Bernard Arriola
BSCPE 3B

Submitted to:
Engr. James Noval

Packet
A network packet is a fundamental unit of data that is bundled together and transported through a
computer network, most often a packet-switched network like the internet. Each packet or block
of data is part of a full message and contains address information that helps identify the
transmitting computer and the intended recipient.
Ping
Ping is a program created by Michael Muss in 1983 that checks if a network data packet can
reach an address without problems. The ping program is frequently used to detect network
issues.
Routing
The process of determining a path across one or more networks is known as network routing.
The routing concepts may be used to any form of network, from telephone networks to public
transportation. Routing determines the pathways that Internet Protocol (IP) packets take from
their origin to their destination in packet-switching networks like the Internet. Routers, which are
specialized pieces of network gear, make these Internet routing decisions.
Modem
A modem is a device that turns data into a signal that can be readily transferred and received
through a phone line, cable, or satellite link. The modem translates data between analog and
digital forms in real time for two-way network communication via an analog telephone line,
which was formerly the most common means to access the internet. The signal in today's high-
speed digital modems is significantly simpler and does not require the analog-to-digital
conversion.
IP Spoofing
IP spoofing is the process of sending Internet Protocol (IP) packets with a changed source
address in order to conceal the sender's identity, mimic another computer system, or both. It is a
tactic that malicious actors frequently employ to launch DDoS attacks against a target device or
the surrounding infrastructure.
Stealing Packets
is a network-created danger in which a hostile actor captures network packets with the intent of
intercepting or stealing unencrypted data transmission.

Basic DoS
A denial-of-service (DoS) attack is a form of cyber-attack in which a malicious actor attempts to
make a computer or other device inaccessible to its intended users by interfering with regular
device operation. DoS attacks normally work by overloading or flooding a targeted computer
with requests until regular traffic cannot be handled, resulting in a denial of service to further
users. A DoS assault is distinguished by the use of a single computer to launch the attack.
Distributed DoS
DDoS assaults are sophisticated attacks that are aimed to overload the network with unnecessary
traffic. A DDoS assault either degrades network performance or causes important infrastructure
to go down.
Smurf Attack
is a type of distributed denial-of-service (DDoS) attack that takes place at the network layer.
Smurfing attacks are called after the DDoS.Smurf virus that allows hackers to carry them out.
More broadly, the assaults are named after the cartoon characters The Smurfs, who can defeat
greater adversaries by teaming together.
Censorship
The restriction or suppression of what material may be published, conveyed, or accessed on the
internet is referred to as internet censorship.
Traceroute
A traceroute is a map that shows how data on the internet travels from its origin to its destination.
When you connect to a website, the data you get must pass through several devices and
networks, notably routers.
Conclusion:
The CS4G Network Simulator Game is a tool designed for education that enables users to learn
about computer networking concepts through an engaging and interactive game. Players can
create and set up virtual networks, test out various technologies and protocols, and work to
resolve problems to enhance their understanding and abilities. The game offers an accurate
simulation environment with realistic scenarios and difficulties, making it a valuable tool for
students, educators, and industry professionals who are interested in network engineering and
cybersecurity.

You might also like