cover photo

COURSEWORK

Priyanka's CL-CY-001 course work. Lv 2

Priyanka J LAUTHORACTIVE
This Report is yet to be approved by a Coordinator.

Marvel Level 1 Report

25 / 10 / 2024


TASK 1: OSI MODEL

OSI model is a type of model that helps us to understand how data is communicated over a network. According to this model there are 7 layers.

  • 1st layer is physical layer: It is responsible for transmission of raw data bits between devices physically in the for of electric signals.
  • 2nd layer is data link: Corrects any error created in physical layer. Also data is packed in the form of frames.
  • 3rd layer is network layer: It receives frames and delivers it to intended address.
  • 4th layer transport layer: It involves in error checking, flow control and sequencing of data packets, also delivering
  • 5th layer session layer: Creates communication channels called sessions. Helps to open sessions and ensure it is functional.
  • 6th layer presentation layer: Ensures translation of data converting it into machine code. Also manages encryption and decryption.
  • 7th layer application layer: Provide services to users to perform activities like file transfer and web-browsing.

TASK 2: GIT BASH AND GITHUB

  • Git is a distributed version control system that tracks the history and versions of the files.

  • GitHub is a website where developers can create, store, manage and share their code. It uses Git software, providing the distributed version control of access control, bug tracking, software feature requests for every project.

  • Git Bash is a command line interface that is used to communicate with Git, the version control system.

  • This task helped in understanding various basic Git commands like add, commit, push. In this task a git repository was initialized and changes were committed and was pushed to GitHub using Git Bash.

TASK: 3 ENCRYPTION TECHNIQUES

Cryptography is a practice and study of techniques to secure communication. It is about constructing and analyzing protocols that prevent third parties or public from reading private messages. Encryption is the process of transforming an ordinary plain text into a cipher text. Decryption is the process of transforming cipher text into plain text. AES : Advanced Encryption Standard is symmetric key cryptography algorithm for protecting sensitive data. Here no. of keys generated by key expansion algorithm is number of rounds+1. 10 rounds contain 128 bits in key (https://github.com/Code4mejl/ENCRYPT-DECRYPT-AES)

TASK 4: IP ADDRESSING AND PROTOCOLS

Using python libraries such as beautifulsoup4 and requests , IP address data from a website is scrapped .

(https://github.com/Code4mejl/webscrapping-ip-address-data)

TASK 5: DATABASES

Database is collection of data. Software application used to manage this database is called database management system. We use SQL to work with relational databases.

(https://github.com/Code4mejl/CRUD-MYSQL)

TASK 6: KALI LINUX AND SSH

Kali Linux is a Linux distribution designed for digital forensics and penetration testing. Nmap stands for Network Mapper , a free, open source tool for network discovery and security auditing.

Nmap scans the networks by sending packets and analyzing the responses. It can find hosts, services, operating systems, and versions , as well as detect security issues. It uses raw IP packets to determine what hosts are available on networks quickly, but it also works well on single hosts.

Secure Shell(SSH) is a cryptographic network protocol that allows users to securely access and manage remote systems over an open network, such as the internet.

TASK 7: LINUX BASED TASK WITH SOCKET.IO

Socket.io is a popular JavaScript library. It is used for real-time web applications. This enables bidirectional and event based communication between the browser and the server.

(https://github.com/Code4mejl/real-time-chat-application)

UVCE,
K. R Circle,
Bengaluru 01