Communication protocols define the rules for transmitting data over a network. They provide an orderly method for exchanging data between sender and receiver. The document then describes the key roles of communication protocols such as data sequencing, routing, formatting, flow control, error control, transmission order, and connection establishment/termination. It also summarizes the OSI model which outlines 7 layers that interact to send data between computers, and describes what each layer is responsible for.
The document provides an overview of the TCP/IP model, describing each layer from application to network. The application layer allows programs access to networked services and contains high-level protocols like TCP and UDP. The transport layer handles reliable delivery via protocols like TCP and UDP. The internet layer organizes routing with the IP protocol. The network layer consists of device drivers and network interface cards that communicate with the physical transmission media.
This document discusses several key design issues that occur across multiple layers in computer networks, including addressing, error control, flow control, multiplexing, and routing. Addressing refers to the need for each layer to identify senders and receivers. Error control handles imperfect physical circuits using error detection and correction codes agreed upon by both ends. Flow control deals with assembling and reassembling messages as they are transmitted. Routing selects a path when multiple options exist between source and destination. Multiplexing and demultiplexing improve network systems by combining and separating multiple communication signals.
Here you will learn:
How to Connect two or more devices to share data and information.
What is OSI Model?
Introduction to OSI Model
What is Physical Layer?
Devices used Physical Layer
What is Signal?
Types of Signals?
Analog Signals
Digital SIgnals
What is Transmission Medium?
What Is Switch in Networking?
Networking 7 Layers.
.
Please like and comments your Question and suggestion?
The document discusses network software and protocols. It defines network software as software used for design, implementation, operation and monitoring of computer networks. It notes that traditionally networks were hardware-based but with software-defined networking, software is separated from hardware. It then discusses protocol hierarchies, design issues for network layers, connection-oriented and connectionless services, service primitives, and the relationship between services and protocols.
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
油
The document discusses data link layer framing and protocols. It describes:
1) Two main approaches to framing - byte-oriented (using sentinel characters) and bit-oriented (using bit stuffing). Protocols discussed include BISYNC, DDCMP, and HDLC.
2) Features of PPP framing including negotiated field sizes and use of LCP control messages.
3) Functions of data link layer including framing, flow control, error control, and media access control. The relationship between the logical link control and media access control sublayers is also covered.
The document discusses the TCP/IP protocol suite and compares it to the OSI model. It describes the layers of the TCP/IP model including the physical, data link, internet, and transport layers. The transport layer uses TCP and UDP, with TCP being connection-oriented and reliable, while UDP is connectionless. The internet layer uses IP to transport datagrams independently. The OSI model has 7 layers while TCP/IP has 5 layers that do not directly correspond to the OSI layers.
switching techniques in data communication and networkingHarshita Yadav
油
This document discusses different types of network switching: circuit switching, packet switching, and message switching. It describes circuit switching as establishing a dedicated electrical path for communication between two ports. Packet switching breaks communication down into small packets that are routed through the network based on destination addresses. There are two approaches for packet switching - datagram and virtual circuit. Datagram packets can take different paths to the destination while virtual circuit establishes a pre-planned route. Message switching does not establish a dedicated path, and each message is treated independently with the destination address added. The document was submitted by several students to their professor.
TCP and UDP are transport layer protocols used for data transfer in the OSI model. TCP is connection-oriented, requiring a three-way handshake to establish a connection that maintains data integrity. It guarantees data will reach its destination without duplication but is slower than UDP. UDP is connectionless and used for applications requiring fast transmission like video calls, but does not ensure packet delivery and order. Both protocols add headers to packets with TCP focused on reliability and UDP on speed.
Congestion avoidance mechanisms aim to predict impending congestion and reduce data transmission rates before packet loss occurs. Three main methods are DEC bit, Random Early Detection (RED), and source-based approaches. DEC bit uses routers to explicitly notify sources of congestion. RED drops packets probabilistically based on average queue length to implicitly notify sources. Source-based methods monitor round-trip times and window sizes to detect congestion and adjust transmission rates accordingly.
Transmission Modes in Computer Networks
There are three modes of transmission, namely: simplex, half duplex, and full duplex. The transmission mode defines the direction of signal flow between two connected devices.
The document is a presentation submitted by Harpreet Kaur on data communications. It contains information on various topics related to data communications including an introduction to data communication, components of data communication such as sender, receiver, message, transmission medium and protocol. It also discusses data flow modes, analog and digital signals, types of transmission media including guided media such as coaxial cable, twisted pair cable and fiber optic cable, and unguided media. Finally, it covers networking devices such as modem, hub, switch and router.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
The application layer allows users to interface with networks through application layer protocols like HTTP, SMTP, POP3, FTP, Telnet, and DHCP. It provides the interface between applications on different ends of a network. Common application layer protocols include DNS for mapping domain names to IP addresses, HTTP for transferring web page data, and SMTP/POP3 for sending and receiving email messages. The client/server and peer-to-peer models describe how requests are made and fulfilled over the application layer.
The document discusses the Medium Access Control (MAC) sublayer of the data link layer and various protocols for determining which device can access a shared communication channel. It focuses on static and dynamic channel allocation problems in local area networks (LANs) and wireless networks. Static allocation wastes bandwidth by assigning each user a fixed portion of the channel even when they are not transmitting. Dynamic protocols like ALOHA and carrier sense multiple access (CSMA) aim to improve channel utilization by allowing users to transmit only when the channel is idle.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):-油This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
- TCP and IP are core protocols of the Internet Protocol Suite, with TCP operating at the transport layer and providing reliable data transmission, and IP operating at the internet layer and routing packets between hosts.
- TCP establishes a virtual connection between hosts and provides services like flow control, error checking, and reliable ordered delivery. It uses port numbers to identify applications.
- Common applications that use TCP include Telnet, FTP, and TFTP, with Telnet using port 23, FTP using ports 20 and 21, and TFTP using port 69.
The document summarizes several wireless network standards and technologies:
- AMPS was the first analog cellular standard developed in 1983 using FDMA. It used half of the signal for sending and half for receiving.
- IS-95 and IS-136 were 2G digital standards, with IS-95 using CDMA and IS-136 using TDMA. GSM is a widely used global 2G standard using TDMA.
- GPRS, EDGE, WCDMA, and CDMA2000 were 3G standards providing faster data speeds and packet-switched networks, with WCDMA and CDMA2000 being the main 3G technologies.
The document compares the OSI model and the TCP/IP model. The OSI model consists of 7 layers and defines a standardized protocol-independent framework. The TCP/IP model has 4 layers and was developed based on the protocols used for the Internet. Key differences are that OSI has stricter layering while TCP/IP layers are more loosely defined, and TCP/IP focuses on the specific protocols used for Internetworking while OSI aims to be protocol-independent.
TCP/IP is a set of communication protocols that allows devices to connect on the internet. It has two main protocols - TCP and IP. TCP ensures reliable delivery of segments through acknowledgements and retransmissions. IP handles addressing and routing of packets between networks. Common applications that use TCP/IP include HTTP, FTP, SMTP and more. It is popular due to its early development and support in operating systems like UNIX.
The document discusses the OSI model, which is a standard framework for network communication. It divides network architecture into seven layers: physical, data link, network, transport, session, presentation, and application. Each layer only communicates with the layers directly above and below it and has a specific set of functions. This layered approach makes networks easier to design, troubleshoot, and maintain when changes are made. The physical layer deals with physical connections and bit transmission. The data link layer organizes bits into frames and controls flow. The network layer decides how data moves between networks. Higher layers ensure reliable and secure delivery of data between applications.
OSI stands for Open Systems Interconnection. It has been developed by ISO International Organization of Standardization, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
The document discusses several internet protocols including Internet Protocol (IP), File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), Secure Sockets Layer (SSL), Telnet, and Gopher. IP is the basic protocol that defines how data is sent between computers on the internet. FTP allows file transfers between systems, HTTP is used for web pages, and HTTPS provides encryption through SSL for secure communication. Telnet allows remote login to systems, and Gopher provides menu-based browsing of internet resources.
The document discusses network models including the OSI model and TCP/IP model. It describes the seven layers of the OSI model and the functions of each layer. It also discusses the four layers of the TCP/IP model and compares the two models, noting they are similar in concept but differ in number of layers and how protocols fit within each model.
This document summarizes key aspects of protocol architecture, TCP/IP, and internet-based applications. It discusses the need for a protocol architecture to break communication tasks into layers. It then describes the layered TCP/IP protocol architecture and its components, including the physical, network access, internet, transport, and application layers. It also summarizes TCP and IP addressing requirements and operation, as well as standard TCP/IP applications like SMTP, FTP, and Telnet. Finally, it contrasts traditional data-based applications with newer multimedia applications involving large amounts of real-time audio and video data.
The document discusses computer networks and networking concepts. It defines a computer network as an interconnection of two or more computers that allows users to share information and resources. The document describes two common network models - the peer-to-peer and client/server models. It also explains the seven layer OSI reference model and compares it to the four layer TCP/IP model. Finally, it categorizes different types of networks including LANs, MANs, WANs, PANs, wireless networks, and home networks.
Here are the number of broadcast and collision domains for each case:
1. A single switch with 10 connected devices:
- Broadcast domain: 1
- Collision domain: 10 (each switch port is its own collision domain)
2. Two switches connected by a single trunk link with 10 devices on each switch:
- Broadcast domain: 2 (each switch is its own broadcast domain)
- Collision domain: 20 (each switch port is its own collision domain)
3. A router connecting two switches, each with 10 devices:
- Broadcast domain: 3 (each physical network segment is its own broadcast domain)
- Collision domain: 20 (each switch port is its own collision domain)
TCP and UDP are transport layer protocols used for data transfer in the OSI model. TCP is connection-oriented, requiring a three-way handshake to establish a connection that maintains data integrity. It guarantees data will reach its destination without duplication but is slower than UDP. UDP is connectionless and used for applications requiring fast transmission like video calls, but does not ensure packet delivery and order. Both protocols add headers to packets with TCP focused on reliability and UDP on speed.
Congestion avoidance mechanisms aim to predict impending congestion and reduce data transmission rates before packet loss occurs. Three main methods are DEC bit, Random Early Detection (RED), and source-based approaches. DEC bit uses routers to explicitly notify sources of congestion. RED drops packets probabilistically based on average queue length to implicitly notify sources. Source-based methods monitor round-trip times and window sizes to detect congestion and adjust transmission rates accordingly.
Transmission Modes in Computer Networks
There are three modes of transmission, namely: simplex, half duplex, and full duplex. The transmission mode defines the direction of signal flow between two connected devices.
The document is a presentation submitted by Harpreet Kaur on data communications. It contains information on various topics related to data communications including an introduction to data communication, components of data communication such as sender, receiver, message, transmission medium and protocol. It also discusses data flow modes, analog and digital signals, types of transmission media including guided media such as coaxial cable, twisted pair cable and fiber optic cable, and unguided media. Finally, it covers networking devices such as modem, hub, switch and router.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
The application layer allows users to interface with networks through application layer protocols like HTTP, SMTP, POP3, FTP, Telnet, and DHCP. It provides the interface between applications on different ends of a network. Common application layer protocols include DNS for mapping domain names to IP addresses, HTTP for transferring web page data, and SMTP/POP3 for sending and receiving email messages. The client/server and peer-to-peer models describe how requests are made and fulfilled over the application layer.
The document discusses the Medium Access Control (MAC) sublayer of the data link layer and various protocols for determining which device can access a shared communication channel. It focuses on static and dynamic channel allocation problems in local area networks (LANs) and wireless networks. Static allocation wastes bandwidth by assigning each user a fixed portion of the channel even when they are not transmitting. Dynamic protocols like ALOHA and carrier sense multiple access (CSMA) aim to improve channel utilization by allowing users to transmit only when the channel is idle.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):-油This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
- TCP and IP are core protocols of the Internet Protocol Suite, with TCP operating at the transport layer and providing reliable data transmission, and IP operating at the internet layer and routing packets between hosts.
- TCP establishes a virtual connection between hosts and provides services like flow control, error checking, and reliable ordered delivery. It uses port numbers to identify applications.
- Common applications that use TCP include Telnet, FTP, and TFTP, with Telnet using port 23, FTP using ports 20 and 21, and TFTP using port 69.
The document summarizes several wireless network standards and technologies:
- AMPS was the first analog cellular standard developed in 1983 using FDMA. It used half of the signal for sending and half for receiving.
- IS-95 and IS-136 were 2G digital standards, with IS-95 using CDMA and IS-136 using TDMA. GSM is a widely used global 2G standard using TDMA.
- GPRS, EDGE, WCDMA, and CDMA2000 were 3G standards providing faster data speeds and packet-switched networks, with WCDMA and CDMA2000 being the main 3G technologies.
The document compares the OSI model and the TCP/IP model. The OSI model consists of 7 layers and defines a standardized protocol-independent framework. The TCP/IP model has 4 layers and was developed based on the protocols used for the Internet. Key differences are that OSI has stricter layering while TCP/IP layers are more loosely defined, and TCP/IP focuses on the specific protocols used for Internetworking while OSI aims to be protocol-independent.
TCP/IP is a set of communication protocols that allows devices to connect on the internet. It has two main protocols - TCP and IP. TCP ensures reliable delivery of segments through acknowledgements and retransmissions. IP handles addressing and routing of packets between networks. Common applications that use TCP/IP include HTTP, FTP, SMTP and more. It is popular due to its early development and support in operating systems like UNIX.
The document discusses the OSI model, which is a standard framework for network communication. It divides network architecture into seven layers: physical, data link, network, transport, session, presentation, and application. Each layer only communicates with the layers directly above and below it and has a specific set of functions. This layered approach makes networks easier to design, troubleshoot, and maintain when changes are made. The physical layer deals with physical connections and bit transmission. The data link layer organizes bits into frames and controls flow. The network layer decides how data moves between networks. Higher layers ensure reliable and secure delivery of data between applications.
OSI stands for Open Systems Interconnection. It has been developed by ISO International Organization of Standardization, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
The document discusses several internet protocols including Internet Protocol (IP), File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), Secure Sockets Layer (SSL), Telnet, and Gopher. IP is the basic protocol that defines how data is sent between computers on the internet. FTP allows file transfers between systems, HTTP is used for web pages, and HTTPS provides encryption through SSL for secure communication. Telnet allows remote login to systems, and Gopher provides menu-based browsing of internet resources.
The document discusses network models including the OSI model and TCP/IP model. It describes the seven layers of the OSI model and the functions of each layer. It also discusses the four layers of the TCP/IP model and compares the two models, noting they are similar in concept but differ in number of layers and how protocols fit within each model.
This document summarizes key aspects of protocol architecture, TCP/IP, and internet-based applications. It discusses the need for a protocol architecture to break communication tasks into layers. It then describes the layered TCP/IP protocol architecture and its components, including the physical, network access, internet, transport, and application layers. It also summarizes TCP and IP addressing requirements and operation, as well as standard TCP/IP applications like SMTP, FTP, and Telnet. Finally, it contrasts traditional data-based applications with newer multimedia applications involving large amounts of real-time audio and video data.
The document discusses computer networks and networking concepts. It defines a computer network as an interconnection of two or more computers that allows users to share information and resources. The document describes two common network models - the peer-to-peer and client/server models. It also explains the seven layer OSI reference model and compares it to the four layer TCP/IP model. Finally, it categorizes different types of networks including LANs, MANs, WANs, PANs, wireless networks, and home networks.
Here are the number of broadcast and collision domains for each case:
1. A single switch with 10 connected devices:
- Broadcast domain: 1
- Collision domain: 10 (each switch port is its own collision domain)
2. Two switches connected by a single trunk link with 10 devices on each switch:
- Broadcast domain: 2 (each switch is its own broadcast domain)
- Collision domain: 20 (each switch port is its own collision domain)
3. A router connecting two switches, each with 10 devices:
- Broadcast domain: 3 (each physical network segment is its own broadcast domain)
- Collision domain: 20 (each switch port is its own collision domain)
Here are the number of broadcast and collision domains for each case:
1. A single switch with 10 connected devices:
- Broadcast domain: 1
- Collision domain: 10 (each switch port is its own collision domain)
2. Two switches connected by a single trunk link with 10 devices on each switch:
- Broadcast domain: 2
- Collision domain: 20 (each switch port is its own collision domain)
3. A router connected to two switches, with 10 devices on each switch:
- Broadcast domain: 3
- Collision domain: 20 (each switch port is its own collision domain)
Network reference models were developed to address challenges with interconnecting networks from different manufacturers. The models serve as a blueprint detailing how communication should occur between network devices. The two most recognized models are the Open Systems Interconnection (OSI) model and the Department of Defense (DoD) model. Both models organize networking functions into layers, with protocols governing communication between layers.
Network reference models were developed to address challenges with interconnecting networks from different manufacturers. The two most recognized models are the Open Systems Interconnection (OSI) model and the Department of Defense (DoD) model. The OSI model consists of seven layers that define specific networking functions, with protocols governing communication between layers. While the OSI model is now deprecated, its terminology is still used to describe network devices and functions.
The document discusses network layer models including the OSI model and TCP/IP model. It provides details on each layer of the models and their functions. The OSI model has 7 layers - physical, data link, network, transport, session, presentation and application. The TCP/IP model combines some of these layers and has 5 layers - physical, data link, network, transport and application. Each layer is responsible for distinct networking functions and passes messages to the adjacent layers for delivery. [/SUMMARY]
The OSI reference model is a standardized framework for network architecture that consists of 7 layers: physical, data link, network, transport, session, presentation, and application. Each layer defines a part of the process of moving information across a network and works together with adjacent layers to provide a unified quality of service. Data moves down through the layers on the sending system and is encapsulated with headers and trailers at each layer before being transmitted. At the receiving system, the reverse process occurs as headers are removed and data is de-encapsulated moving up the layers.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It then explains the five layers of the TCP/IP model and how encapsulation works. The document also covers topics such as addressing, fragmentation, segmentation, and IP addressing and subnetting.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It also explains the four layers of the TCP/IP model and some of the common protocols used in each layer such as IP, TCP, UDP, HTTP, FTP etc. Additionally, it summarizes the Address Resolution Protocol (ARP), which maps IP addresses to MAC addresses when a host needs to deliver a packet on a local network.
This document provides information on layering in networked computing by discussing the OSI and TCP/IP models. It begins by outlining the learning objectives, which are to understand the need for layering, the layers and protocols in each model, and how data is transmitted between layers and hosts. It then describes each layer in the OSI model and its functions. The TCP/IP model is also explained, comparing it to the OSI model by mapping its 4 layers to the 7 layers of OSI. Key protocols at each layer are identified and packet encapsulation in TCP/IP is demonstrated.
The document discusses network security models and the OSI reference model. It describes the seven layers of the OSI model from the physical layer to the application layer. It then discusses the TCP/IP reference model and its four layers from the link layer to the application layer. The document summarizes key protocols associated with each layer, including IP, TCP, UDP, and protocols that provide security at the transport and network layers like SSL/TLS and IPSec.
The document provides information about the OSI model and network protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It explains the functions of each layer, such as the physical layer being responsible for transmitting binary digits between devices and the transport layer ensuring packets are not lost during transmission. It also discusses the differences between TCP and UDP network protocols, with TCP providing reliable transmission and UDP being faster but less reliable. The document defines MAC addresses as unique identifiers for network devices and how they differ from IP addresses.
The document discusses the TCP/IP and OSI networking models. It introduces the TCP/IP model, which was developed in 1978 and forms network communication into seven layers. It then describes the OSI model, which was developed by the International Organization for Standardization (ISO) and breaks network functions into seven layers. The layers of both models are explained, with the lower layers handling physical transmission and higher layers providing services to applications. The OSI model is now more commonly used as a standard for network design.
The document provides an overview of the seven layers of the OSI model:
1) The physical layer defines physical connections and transmission of raw bit streams.
2) The data link layer provides addressing and error checking for data transmission between systems on a local network.
3) The network layer establishes logical addressing to route packets across multiple networks and provides fragmentation and reassembly of packets.
4) The transport layer offers reliable or unreliable data transmission and handles issues like flow control and multiplexing of data streams.
5) The session layer manages communication sessions, synchronizing data flow between endpoints.
The document provides information about the OSI model and TCP/IP reference model. It describes the seven layers of the OSI model from the physical layer to the application layer and summarizes the responsibilities of each layer. It then compares the OSI model to the TCP/IP reference model, noting their similarities like layered architecture and application layers, as well as differences such as TCP/IP combining layers and being more simplified.
This is a notes about basic introduction of OSI Model & TCP/IP Model. It contain details about the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
Botnets are networks of compromised computers that are used to conduct criminal online activities like spamming and phishing. They are controlled by botmasters through command and control servers. The document discusses how botnets utilize platforms like Windows and Unix machines, and spyware, adware, and malware to conduct spamming, phishing, denial of service attacks, and steal personal information. It also summarizes various network security measures that can help prevent the spread of botnets, including user education, firewalls, IPSec, SSL/TLS, RADIUS authentication, security tokens, and biometrics.
WiMax (Worldwide Interoperability for Microwave Access) is a wireless technology that provides broadband connections over long distances using radio signals rather than cables or wires. It uses the IEEE 802.16 standard to deliver high-speed internet access of up to 40 Mbps to fixed locations and 15 Mbps for mobile use within a few kilometers of the base station. WiMax can provide both fixed and mobile broadband access as an alternative to cable and DSL. It has a longer range than WiFi with connections of up to 30 miles using line-of-sight antennas.
This document discusses OFDM and OFDMA technologies. It begins with an outline of topics including the need for multi-carrier transmission, how OFDM addresses this need using FFT and IFFT, guard time insertion using cyclic prefixes, drawbacks of OFDM including high PAPR, channel estimation techniques, and an OFDM block diagram. It then discusses OFDMA which allows simultaneous transmissions to multiple users using OFDM signaling. Diversity techniques including time, frequency, and spatial diversity are also summarized.
GSM and CDMA are competing mobile network technologies. GSM uses TDMA to allow multiple calls over the same frequency, while CDMA spreads data over the entire channel and assigns each call a unique code. CDMA offers more efficient spectrum usage and increased battery life. The main difference is that GSM uses SIM cards to identify users, while CDMA stores user data on operator databases.
This document discusses how networks impact daily life and the role of data networking. It describes how instant communication benefits society by supporting education and remote work. Networks allow sharing information and collaborating through tools like instant messaging, blogs, and podcasts. The key components of any network are devices connected by a medium that transmit messages according to shared rules. Converged networks carry voice, video, and data, improving communication. Network architecture aims for fault tolerance, scalability, quality of service, and security through techniques like packet switching, standards, and encryption.
GSM security features include subscriber identity protection using TMSIs, key management using shared Kis, equipment authentication using IMEIs, and signaling and data encryption using A3, A8, and A5 algorithms. However, these security mechanisms have been weakened over time as the algorithms have been cracked or leaked, allowing for fraud and privacy risks. Potential improvements include using stronger cryptographic algorithms for authentication and encryption and encrypting traffic on the operator's backbone network.
1. Communication Protocols
Describes the rules that govern the
transmission of data over the communication
Network.
Provide a method for orderly and efficient
exchange of data between the sender and the
receiver.
2. Roles of Communication Protocol
1. Data Sequencing to detect loss or duplicate
packets.
2. Data Routing to find the most efficient path
between source and a destination.
3. Data formatting defines group of bits within a
packet which constitutes data, control,
addressing and other information.
4. Flow control ensures resource sharing and
protection against traffic congestion by
regulating the flow of data on communication
lines.
3. Roles of Communication Protocol
5. Error control detect errors in messages. Method
for correcting errors is to retransmit the erroneous
message block.
6. Precedence and order of transmission condition
all nodes about when to transmit their data and
when to receive data from other nodes. Gives
equal chance for all the nodes to use the
communication channel.
7. Connection establishment and termination
8. Data security Prevents access of data by
unauthorized users.
4. The OSI Model
OSI is short for Open Systems Interconnection.
OSI model was first introduced by the International
Organization for Standardization (ISO) in 1984
Outlines WHAT needs to be done to send data from one
computer to another.
Protocols stacks handle how data is prepared for
transmittal
Contains specifications in 7 different layers that
interact with each other.
5. What is THE MODEL?
Commonly referred to as the OSI reference
model.
Open system interconnection (OSI) model is a
framework for defining standards for linking
heterogeneous computer systems, located
anywhere.
The OSI model is a theoretical blueprint that
helps us understand how data gets from one
users computer to another.
It is also a model that helps develop standards
so that all of our hardware and software talks
nicely to each other.
6. 7 Layer OSI Model
Why use a reference model?
Serves as an outline of rules for how protocols can be used
to allow communication between computers.
Each layer has its own function and provides support to
other layers.
Other reference models are in use.
Most well known is the TCP/IP reference model.
7. 7 Layer OSI Model
Open system interconnection (OSI) model is a framework
for defining standards for linking heterogeneous computer
systems, located anywhere.
9. Application Layer
Gives end-user
applications access to
network resources
Where is it on my
computer?
Workstation or Server
Service in MS Windows
3
3Graphic courtesy of http://www.hawkclan.com/zxonly/iso/slide2.html
10. Presentation Layer
Provides common data
formatting between
communicating
devices
Components make
sure the receiving
station can read the
transferred data
3
3Graphic courtesy of http://www.hawkclan.com/zxonly/iso/slide2.html
11. Session Layer
Allows applications to
maintain an ongoing
session
Example NetBIOS
Where is it on my
computer?
Workstation and
Server Service (MS)
Windows Client for
NetWare (NetWare)
3
3Graphic courtesy of http://www.hawkclan.com/zxonly/iso/slide2.html
12. Transport Layer
Provides reliable data
delivery
Its the TCP in TCP/IP
Receives info from
upper layers and
segments it into packets
Can provide error
detection and correction
3
3Graphic courtesy of http://www.hawkclan.com/zxonly/iso/slide2.html
13. Network Layer
Provides network-
wide addressing and a
mechanism to move
packets between
networks (routing)
Responsibilities:
Network addressing
Routing
Examples:
IP from TCP/IP
3
IPX from IPX/SPX
3Graphic courtesy of http://www.hawkclan.com/zxonly/iso/slide2.html
14. Network Addresses
Network-wide addresses
Used to transfer data across subnets
Used by routers for packet forwarding
Example:
IP Address
Where is it on my computer?
TCP/IP Software
15. Data Link Layer
Places data and
retrieves it from the
physical layer and
provides error
detection capabilities
3
3Graphic courtesy of http://www.hawkclan.com/zxonly/iso/slide2.html
16. Sub-layers of the Data Link Layer
MAC (Media Access Control)
Gives data to the NIC
Controls access to the media through:
CSMA/CD Carrier Sense Multiple Access/Collision
Detection
Token passing
LLC (Logical Link Layer)
Manages the data link interface (or Service Access
Points (SAPs))
Can detect some transmission errors using a Cyclic
Redundancy Check (CRC). If the packet is bad the LLC
will request the sender to resend that particular packet.
17. Physical Layer
Determines the specs for
all physical components
Cabling
Interconnect methods (topology
/ devices)
Data encoding (bits to waves)
Electrical properties
Examples:
Ethernet (IEEE 802.3)
Token Ring (IEEE 802.5)
Wireless (IEEE 802.11b)
3
3Graphic courtesy of http://www.hawkclan.com/zxonly/iso/slide2.html
18. Physical Layer (contd)
What are the Physical Layer components on my
computer?
NIC
Network Interface Card
Has a unique 12 character Hexadecimal number
permanently burned into it at the manufacturer.
The number is the MAC Address/Physical address of a
computer
Cabling
Twister Pair
Fiber Optic
Coax Cable
19. How Does It All Work Together
2
2Cisco Academy Program Semester 1
20. The TCP/IP Model
Another Model is the TCP/IP Model.
There is no universal agreement regarding how to
describe TCP/IP with a layered model.
Most descriptions present three to five layers.
We use the four layer structure that incorporates
the Presentation and Session layers with the
Application layer.
22. The TCP/IP Model (4 Layer)
Application Layer
Interacts with user processes
Transport Layer
TCP guarantees data is received and sent accurately
Internet Layer
IP separates upper layers from the network and manages
the connections across the network
Network Access Layer
Incorporates the Network and Physical layers of the OSI
model
4
4 http://www.pku.edu.cn/academic/research/computer-center/tc/html/TC0102.html
23. Remembering the 7 Layers
7 - Application All
6 - Presentation People
5 - Session Seem
4 - Transport To
3 - Network Need
2 - Data Link Data
1 - Physical Processing