Professional Documents
Culture Documents
UNIT-4: Computer Network
UNIT-4: Computer Network
UNIT-4
1 lectureTales.com
Computer Network
b) Character/string conversion
c) Data compression
d) Graphic handling
2 lectureTales.com
Computer Network
external network. The objective of this packet is to ask/infer if the server is open for new
connections.
b) The target server must have open ports that can accept and initiate new connections.
When the server receives the SYN packet from the client node, it responds and returns a
confirmation receipt – the ACK packet or SYN/ACK packet.
c) The client node receives the SYN/ACK from the server and responds with an ACK
packet.
3 lectureTales.com
Computer Network
In RPC, the sending computer makes a request in the form of a procedure, function, or method
call. RPC translates these calls into requests and sends them over the network to the intended
destination. The RPC recipient then processes the request based on the procedure name and
argument list, and sends a response to the sender when complete. RPC applications
typically implement software modules called "proxies" and "stubs" that broker the remote calls
and make them appear to the programmer to be the same as local procedure calls.
4 lectureTales.com
Computer Network
Lossy compression With lossy compression, it is assumed that some loss of information is
acceptable. The best example is a videoconference where there is an acceptable amount of frame
loss in order to deliver the image in real time. People may appear jerky in their movements, but
you still have a grasp for what is happening on the other end of the conference. In the case of
graphics files, some resolution may be lost in order to create a smaller file. The loss may be in
the form of color depth or graphic detail.
Lossless compression With lossless compression, data is compressed without any loss of data.
It assumes you want to get everything back that you put in. Critical financial data files are
examples where lossless compression is required
Lossy compression can provide compression ratios of 100:1 to 200:1, depending on the type of
information being compressed. Lossless compression ratios usually only achieve a 2:1
compression ratio.
5 lectureTales.com
Computer Network
4.8 CRYPTOGRAPHY:
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography
enables you to store sensitive information or transmit it across insecure networks (like the
Internet) so that it cannot be read by anyone except the intended recipient.
6 lectureTales.com
Computer Network
802.11 is the collection of standards set up for wireless networking. 802.11 lives in the physical
layer and data link layer in the OSI.
7 lectureTales.com
Computer Network
IEEE 802.3 uses CSMA/CD for Multiple Access which senses carrier before transmitting and
listens for a collision while transmitting. When it detects collision it backs off and wait for
random time and retransmit.
A ring is first initialized by using a coordinator and the stations are inserted in the order of their
address.
8 lectureTales.com
Computer Network
EXERCISE
QUE: What is the difference between network layer delivery and the transport layer delivery?
The network layer is responsible for the source-to-destination delivery of packet across multiple network links.
The transport layer is responsible for source-to-destination delivery of the entire message. transport layer protocol
provides logical communication between processes running on different hosts , whereas network layer protocol
provides logical communication between hosts.
QUE: What is the difference between block cipher and transposition cipher?
Both Block Cipher and Stream Cipher are belongs to the symmetric key cipher. These two
block cipher and stream cipher are the methods used for converting the plain text into cipher text.
The main difference between Block cipher and Stream cipher is that block cipher converts
Converts the plain text into cipher text by taking plain text’s block at a time. While stream cipher
Converts the plaint text into cipher text by taking 1 byte of plain text at a time.
In a transposition cipher, the plaintext is repositioned, but the letters are left unchanged. In
contrast, a substitution cipher maintains the same sequence of the plaintext and modifies the
letters themselves.
9 lectureTales.com
Computer Network
5. Lossless Encoding
This is the final step and this method uses huffman coding and it reduces a large amount of memory without
loosing any detail of the image. Most of the times it saves 70% of the memory. What this encoding method
does is it gets the frequency of different pixels and store that pixels and the frequency instead of storing each
pixel.
10 lectureTales.com
Computer Network
Audio Compression
Digital audio compression enables more efficient storage and transmission of audio data. The
many forms of audio compression techniques offer a range of encoder and decoder complexity,
compressed audio quality, and differing amounts of data compression. The µ-law transformation
and ADPCM coder are simple approaches with low-complexity, low-compression, and medium
audio quality algorithms. The MPEG/audio standard is a high complexity, high-compression,
and high audio quality algorithm. These techniques apply to general audio signals and are not
specifically tuned for speech signals.
Streaming Audio
A one-way audio transmission over a data network. It is widely used to listen to audio clips and radio from the
Internet on computers, tablets and smartphones. In addition, computers are commonly set up to stream a user's
music collection to a digital media hub connected to a stereo or home theater. Computers and mobile devices may
also stream directly to powered speakers via Bluetooth or Wi-Fi.
11 lectureTales.com
Computer Network
1) n = p x q = 17 x 19 = 323
z = (p - 1) x (q - 1) = 16 x 18 = 288
d should be relatively prime to z 5, 7, 11, 13, 17, 19
2) n = p x q = 7 x 11 = 77
z = (p - 1) x (q - 1) = 6 x 10 = 60
13 x e mod 60 = 1
13 x e = 1, 61, 121, 181, 241, 301, 361, 421, 481, ....
13 x e = 481 => e = 37
3) n = p x q = 7 x 17 = 119
z = (p - 1) x (q - 1) = 6 x 16 = 96
19 x e mod 96 = 1
19 x e = 1, 97, 193, 385, 481, 577, 673, 769, 865, 961, 1057, 1153, 1249, 1345, 1441,
1537, 1633, 1729, ....
19 x e = 1729 => e = 91
c h e e r s
-------------------------
P= 3 8 5 5 18 19
C= 24 36 96 96 18 110
12 lectureTales.com