Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

WELCOME

A POWER POINT PRESENTATION ON

Co-elucidated by

KUMAR ABHISHEK
&

(C.Sc.E)

KUMAR MURLIDHAR (E.C.E)

A Computer Network is an interconnection of a group of computers. Networks may be Classified by what is called the network layer at which they operate according to basic reference models considered as standards in the industry such as the four-layer Internet Protocol Suite model.

On the basis of SCALE

 A network covering a small geographic area, like a home,

office, or building.  Current LANs are most likely to be based on Ethernet technology.

Between LANs and WANs

Traditional point-to-point and switched networks in WANs inadequate for growing needs of organizations Requirement for high capacity private and public networks at low costs over a large area

e.g. Wireless networks, metropolitan extensions to Ethernet

 A WAN is a data communications network that covers a relatively

broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies.

Intranet

An INTRANET is a set of interconnected networks, using the Internet Protocol and uses Ipbase tools such as web browsers, that is under the control of a single administrative entity.

Extranet An EXTRANET is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks

The internet

 Evolved from ARPANET, 1969

Advanced Research Projects Agency (ARPA),U.S. Department of Defense.  Began in four locations: UCLA, University of Santa Barbara, the University of Utah, and SRI (Stanford Research Institute)  WWW was developed in Spring 1989, at CERN (the European Laboratory for Particle Physics) by Tim Berners-Lee.  Explosive growth came with first graphically oriented browser, Mosaic, 1993

1. BUS TOPLOGY
Each node is daisy-chained (connected one right after the other) along the same backbone. Information sent from a node travels along the backbone until it reaches its destination node.

 Similar to a bus network,

rings have nodes daisy chained, but the end of the network in a ring topology comes back around to the first node, creating a complete circuit. Each node takes a turn sending and receiving information through the use of a token.

 In a star network, each

node is connected to a central device called a hub. The hub takes a signal that comes from any node and passes it along to all the other nodes in the network.

CONDUCTIVE: twisted pairs and coaxial cables

ELECTROMAGNETIC: microwave

LIGHT: lasers and optical fibers (need clear line of sight)

WIRELESS inner/ outer space ; satellite (omnidirectional security issues)

THE OSI REFERENCE MODEL

File Transfer, Email, Remote Login ASCII Text, Sound (syntax layer) Establish/manage connection End-to-end control & error checking (ensure complete data transfer): TCP Routing and Logical Addressing: IP Two party communication: Ethernet How to transmit signal; coding Hardware means of sending and receiving data on a carrier

HTTP Telnet SNMP

This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the Hypertext Transfer protocol

A remote terminal emulation protocol that enables clients to log on to remote hosts on the network.

Used to remotely manage network devices. Stands for the Simple Network Management Protocol.

Security Requirements

Confidentiality Integrity Availability Authenticity

Passive Attacks

Eavesdropping on transmissions Release of message contents Difficult to detect Can be prevented

Active Attacks

Masquerade Replay Modification of messages Denial of service Easy to detect Hard to prevent

Ingredients
a) Plain text b) Encryption algorithm c) Secret key d) Ciphertext e) Decryption algorithm

THE RSA ALGORITHM


             

Key Generation Select p, q p and q both prime, p { q Calculate n = p q Calculate J(n) = (p 1)(q 1) Select integer gcd (J(n), e) = 1; 1 < e < J(n) Calculate d de mod J(n) = 1 Public key KU = {e, n} Private key KR = {d, n} Encryption Plaintext: M<n Cipher text: C = Me (mod n) Decryption Cipher text: C Plaintext: M = Cd (mod n)

Fault

Security

Elements of Network Management

Accounting

Performance

1.THE INTERNET GRID




2.THE GOOGLE WAVES




Grid computing is the combination of


computer resources from multiple administrative domains applied to a common task, usually to a scientific, technical or business problem that requires a great number of computer processing cycles or the need to process large amounts of data.

Google Wave is It is a web-based service, computing platform, and communications protocol designed to merge e-mail, instant messaging, wikis, and social networking.

Computer Networks By Andrew Tenenbaum.  Digital Communication And Networking by Behrouz A. Forouzan.  Communication Networks by Alberto Leon Garcia & Indra Widjaja.  www.google.com, www.dogpile.com, www.ask.com, www.compnetworking.about.com


You might also like