Professional Documents
Culture Documents
DCN Full
DCN Full
7.1
Electromagnetic spectrum for wireless communication
7.2
Unguided signals
1.Unguided signals can travel from the source to
destination in several ways:
2.Ground propagation,
3.Sky propagation
4.Line-of-sight propagation
5. m
7.3
Unguided signals
• In ground propagation, radio waves travel through
the lowest portion of the atmosphere, hugging the
earth. These low-frequency signals emanate in all
directions from the transmitting antenna and follow
the curvature of the planet. Distance depends on the
amount of power in the signal: The greater the
power, the greater the distance.
• In sky propagation, higher-frequency radio waves
radiate upward into the ionosphere (the layer of
atmosphere where particles exist as ions) where they
are reflected back to earth. This type of transmission
allows for greater distances with lower output power.
7.4
Unguided signals
7.5
Table 7.4 Bands
7.6
Figure 7.19 Wireless transmission waves
7.7
Microwave terrestrial
• It is unidirectional
• It propagate in line of sight
• Repeaters are needed for long distance
communication
• Used for long distance telephone service
• Used for both voice and television transmission
• Dish transmitter is mounted high
7.8
Satellite
A satellite is an object in space that orbits or circles
around a bigger object. There are two kinds of
satellites: natural (such as the moon orbiting the
Earth) or artificial (such as the International Space
Station orbiting the Earth.
• Communications Satellite.
• Remote Sensing Satellite.
• Navigation Satellite.
• Geocentric Orbit type satellites
• Global Positioning System (GPS)
• Geostationary Satellites (GEOs)
• Drone Satellite.
• Ground Satellite.
7.9
Advantages of Satellite
• Satellites effectively support on a global basis all
forms of communications ranging from simple
point-of-sale validation to bandwidth intensive
multimedia applications
• Satellite solutions are highly flexible and can
operate independently or as part of a larger network
• They support radio and cable television transmission
• They allow us to make cellular phone calls from
long distances.
7.10
Disadvantages of Satellite
• Satellites are expensive to develop them and
launching them into space. Satellites are costly even
when they are successfully launched, but all too
often, launches end in failure. In 2017, the billion-
dollar spy satellite, Zuma, was lost when the rocket
carrying it failed to reach orbit height. Satellite costs
may rise as satellite technologies grow more complex
to handle different purposes.
• Somewhat unreliable signal. There are different
factors that affect the strength and reception of a
satellite signal. There are also circumstances, such
as weather or sunspots which may be impossible to
alter
7.11
Disadvantages of Satellite
• Propagation delay The time can vary between 270
milliseconds to reach the satellite from Earth and
return again to 320 milliseconds. This delay can
cause an echo over telephone connections.
• There are No Repair Shops in Space
7.12
Satellite
• Satellites maximum weight can be of 7 tons
• Satellite minimum weight can be of 100kg
• A good minimum height for a satellite is 100
km above the Earth's surface
• Most satellites are placed into orbit between 500
and 1500 km
7.13
Infrared
It is a region of the electromagnetic radiation
spectrum where wavelengths range from about 700
nanometers (nm) to 1 millimeter
(mm). Infrared waves are longer than those of visible
light, but shorter than those of radio waves.
• Typically used for television remote control
• It need no license
• It is blocked by wall
• Transmitter and receiver must be in line of sight
• It can be use for short range communication in
close area
7.14
Radio Wave
• It is electromagnetic radiation used for multicast
communication such as radio , television and toys.
• The frequency of radio waves ranges from 3 kHz to
300 GHz.
• Radio waves have enabled better navigation on
aircrafts and ships
7.15
Disadvantages of Radio Wave
• They cannot transmit a lot of data simultaneously
because they're low frequency
• continued exposure to large amounts of radio waves
can cause health disorders like leukemia and
cancer.
7.16
5-1 Modulation
7.17
5-2 Modulation types
7.18
5-3 Analog Modulation
7.20
5-3-1 Amplitude Modulation
7.21
5-3-2 Frequency modulation
7.22
5-3-2 Frequency modulation
7.23
5-3-3 Phase modulation
7.24
5-3-3 Phase modulation
7.25
5-4 Digital Modulation
7.27
5-6 Encoding Schemes
7.28
5-6 Encoding Schemes
7.29
5-6-1 Nonreturn To Zero Level NRZ-L
In telecommunication, a non-return-to-zero (NRZ) line
code is a binary code in which ones are represented by
one significant condition, usually a positive voltage,
while zeros are represented by some other significant
condition, usually a negative voltage, with no other
neutral .
In it signal drops (returns) to zero between each pulse.
This takes place even if a number of consecutive 0s or 1s
occur in the signal.
7.30
5-6-3 Multilevel Binary Bipolar-AMI
7.31
5-6-2 Nonreturn To Zero Inverted
It is a binary code used in telecommunications
transmission, where a data bit of 1 is positive voltage,
and a data bit of 0 is negative voltage. NRZ code does
not have a neutral state, versus Return to Zero (RZ)
code, which has a rest state.
7.32
5-5-4 Manchester Encoding
7.33
5-5-5 Differential Manchester Encoding
7.34
6-1 Digital Data Communications Techniques
4.35
6-2 Synchronization
4.36
6-2-1 Synchronous transmission
4.37
6-2-1 Synchronous transmission
4.38
6-2-2 Asynchronous transmission
4.39
6-2-2 Asynchronous transmission
• simple
• Cheap
• Require no clock synchronization
• overhead of 2 or 3 bits per char (~20%)
• good for data with large gaps (keyboard)
4.40
6-3 Error in Transmission
• single-bit errors
• burst errors
4.41
6-3-1 Single bit error
4.42
6-3-2 Burst Error
4.43
6-4 Parity bit
4.45
6-5 Cyclic Redundancy Check
4.46
6-5 Cyclic Redundancy Check
Exclusive R
1 1 = 0
0 0 = 0
1 0 = 1
0 1 = 1
4.47
6-5 Cyclic Redundancy Check
4.48
Bridge
A networking device that connects two LANs and forward or filter data
packets between them based on their destination address. Bridges operate
at data link level (or MAC layer). A bridge is able to read MAC address
(hardware address or Ethernet address) of each packet circulating on the
network segments connected to the bridge
4.49
Repeater
4.50
Switch
4.51
Router
Routers are even smarter than bridges and switches as a router contain a
combination of software and hardware to route the data from source to
destination and have the capability to connect two different local area
networks .Routers divide large network into logical segments called
subnets and router decide how to forward data packets to their
destination based on routing table.
4.52
Router
4.53
Flow Control
4.54
Flow Control
4.55
Connection-Oriented(TCP)
4.56
Connectionless(IP ,UDP)
4.57
Stop and Wait
Source
• Source transmits single packet at a time
• Wait for ACK then send next packet
Receiver
• Send acknowledgement after receiving and
consuming data packet
4.59
Stop and Wait
4.60
Problems in Stop and Wait
Lost data
• Sender wait for acknowledgment
• Receiver wait for data for infinite amount of time
Lost acknowledgement
• Sender wait for ack for infinite amount of time
Delayed acknowledgment
• After time out on sender side a long delayed ack might
be wrongly considered as ack of some other packets.
Because there is no buffer on sender or receiver side
4.61
Problems in Stop and Wait
4.62
Problems in Stop and Wait
4.63
Stop and Wait ARQ
4.64
Stop and Wait Flow diagram
4.65
Sliding Window Protocol
Sequence number
It is given to each outbound frame
Sliding window
It is like a boxes(buffer) to accommodate temporary data frames to
improve the efficiency. They are present at transmitter and
receiver
4.67
Sliding Window
4.68
Go back N
4.69
Go back N
4.70
4.71
Go back N
4.72
Go back N
Damaged Frame
• Receiver send NAck with frame number
• After NAck receiver discard all frames
Lost Frame
• Check the number of each frame
• Just check the sequence
• Resent that specific frame
• Arrange sequence number
• Lost ACK
• Sender will retransmit all the frames after lost of ack
4.73
Sliding Window Flow Control
4.74
Selective Repeat
4.75
Selective Repeat
4.76
High Level Data Link Control Protocol
Primary station
Data sender is known as primary station. It carries
maximum features and responsibilities as it can control
data flow.
Secondary station
It is receiver which receive data and services from
primary station. It has low features and responsibilities
and always depends upon primary station for data flow.
Combined station
it transmit and respond data at a time without any
interruption from the primary station.
4.78
HDLC Operation modes
4.80
HDLC Frame Structure
Flag
Indicate the start and stop of frame
Address
It will hold the secondary station address. Whether
the frame is moving from primary to secondary
station or vice versa.
4.81
HDLC Frame Structure
Control
It will show the attributes used to control the data
flow like ack, frame number , sequence number.
Information
It contain data which can be of variable size depend
upon the user.
4.83
Spread Spectrum
4.84
Advantages of Spread Spectrum
4.85
General model for Spread Spectrum
4.86
General model for Spread Spectrum
4.87
Frequency Hopping Spread Spectrum
4.90
Frequency Hopping graph
we change frequency with respect to time that is called
frequency hopping. So in each instance frequency is
hopping
4.91
Frequency Hopping Spread Spectrum
Military use
Spread-spectrum signals are highly resistant to deliberate jamming,
unless the adversary has knowledge of the frequency-hopping pattern.
Military radios generate the frequency-hopping pattern under the
control of a secret Transmission Security Key (TRANSEC) that the
sender and receiver share in advance. This key is generated by devices
such as the KY-57 Speech Security Equipment.
4.92
Frequency Hopping Spread Spectrum
Civilian use
In the US, since the Federal Communications Commission (FCC)
amended rules to allow FHSS systems in the unregulated 2.4 GHz
band, many consumer devices in that band have employed various
FHSS modes.
4.93
Advantages of FHSS
4.94
Disadvantages of FHSS
4.95
Direct Sequence
4.96
Direct Sequence
4.97
Direct Sequence
4.98
Advantages of Direct Sequence
4.99
Disadvantages of Direct Sequence
4.100
Multiplexing
4.101
Multiplexing/Demultiplexing
4.102
Why use Multiplexing
• To make it possible for any network device to talk to any other network
device without having to dedicate a connection for each pair. This
requires shared media
• To make an expensive resource stretch further , to send many signals
down each cable or fiber strand running between major metropolitan
areas, or across one satellite uplink
4.103
Analog Multiplexing
4.104
Digital Multiplexing
4.105
Advantages of Multiplexing
• More than one signals can be sent over single medium or link
• Effective use of bandwidth of medium
4.106
FDMA
4.107
FDMA
4.108
How does FDMA works
Usage
Early cellular telephony mostly used FDMA analogue transmission.
Walkie talkies and mobile networks for closed user groups often use
FDMA
4.109
TDMA
4.110
TDMA
4.111
How does TDMA works
usage
TDMA is used in the digital 2G cellular systems such as Global System
for Mobile Communications (GSM), IS-136, Personal Digital Cellular
4.112
TDMA
4.113
TDMA types
4.114
Synchronous time-division multiplexing
4.115
Asynchronous time-division multiplexing
4.116
Interleaving time-division multiplexing
4.117
Statistical time-division multiplexing
4.118
Statistical time-division multiplexing
4.119
WDMA
4.120
WDMA
4.121
How does WDMA works
Usage
It is a technique in fiber optic transmission that enables the use of
multiple light wavelengths (or colors) to send data over the same
medium. Two or more colors of light can travel on one fiber and
several signals can be transmitted in an optical waveguide at differing
wavelengths.
4.122
CDMA
4.124
CDMA Usage
User # 01
User data = 00
Spreading code = 0101
User # 02
User data = 10
Spreading code = 0011
User # 03
User data = 11
Spreading code = 0000
4.128
Composite weave form
4.129
User 1 data retrieval
4.130
User 2 data retrieval
4.131
User 3 data retrieval
4.132
Security Threats
4.133
Security Threats
Interruption
Interruption is a security threat in which availability of
resources is attacked. For example a user is unable to access its
web server.
Privacy Breach
In this threat, the privacy of a user is compromised. Someone,
who is not the authorized person is accessing or intercepting
data sent or received by original authenticated user.
4.134
Security Threats
Interruption Interception
An unauthorized party gain access to information with the help
of some sniffer and wire trapping. In it information are also
going to its destination but unauthorized party also gain it at
the same time while sender and receiver are not aware of this
theft. In this process unauthorized party cant damage or
change to information
4.135
Security Threats
Sniffier
Software that is used to gain the unauthorized access of
information is called sniffer. Often sniffer are used in LAN
while in WAN we can’t predict the route of information so it is
difficult for a sniffer to work efficiently in wide area network.
Anti Sniffer
Software that we use to avoid from the possibility of exposing
information
4.136
Security Threats
Integrity
This type of threat includes any alteration or modification in the
original context of communication. The attacker intercepts and
receive the data sent by the sender and the attacker then either
modifies or generates false data and send to the receiver. The
receiver receive the data assuming that it is being sent by the
original sender.
4.137
Security Threats
Authenticity
This threat occur when an attacker or a security violator poses as
a genuine person and access the resources or communicate with
other genuine person.
No technique in the present world can prove100% security. But
steps can be taken to secure data while it travels in unsecured
network or internet. The most widely used technique is
cryptography.
4.138
Security Types
Physical Control
Prevent physical access to sensitive data by closing circuit,
surveillance cameras, and alarm system. These physical system
are not reliable for example a virus can enter into a system
even we use alarm or cameras.
4.139
Technical Security
• Encryption
• Smart cards
• Network Authentication
• Access Control Lists
• File Integrity
4.140
Technical Security
Encryption
In this process we change the format of our information on bits
level and then send it to the desire destination so that sniffer or
wire trapper can not recognize the information.
Smart Cards
In this process we use the finger prints, voice pattern or eye
retina structure to avoid from the unauthorized person access
to the sensitive information.
4.141
Technical Security
Network Authentication
In this process we use the password to access the data and
information to minimize the exposure of information for
example to open email accounts or login to local area network
we use password.
4.143
Cryptography or Encryption
Symmetric Encryption
Symmetric encryption is also known as conventional encryption ,
secret key , or single key encryption .It was the only type of
encryption in use prior to the development of public key
encryption in the late 1970.We often use three types of encryption
algorithms known as DES, Triple DES, AES
DES = Data Encryption Standard AES = Advanced
Encryption Standard
4.145
Symmetric Encryption
Plain Text
The data is written into simple text form and fed into the
algorithm as input.
Encryption Algorithm
It perform various algorithms substitution and transformation
on the plain text and change the original shape of text often used
algorithms are used as DES,AES and Hash.
4.146
Symmetric Encryption
Secret Key
It is also input to algorithms the exact substitution and
transformation performed by the algorithm depends on the key
so for strong encryption the key must be long one. Usage of long
key will increase the overhead but the data becomes more secure.
Decryption Algorithms
Take the input as encrypted data use key and algorithms to
produce the original data. The key and algorithms should be
same on both on receiver and sender sides.
4.148
Requirement of symmetric Encryption
4.149
Key Distribution
4.151
Cryptography
4.152
Cryptography
4.153
Cryptography
Message Digest
In this method, actual data is not sent; instead a hash value is
calculated and sent. The other end user, compute its own hash
value and compare with the one just received. If both hash
values are matched, then it is accepted, otherwise rejected.
MD5 hashing is example of message digest it is mostly used in
authentication where user password is cross checked with the
one saved on the server.
4.154
Virus
4.155
How does a Computer Virus Spread
4.156
Computer Virus Symptoms
4.157
What to do
4.158
Virus types
4.159
Virus types
Resident Virus
The Resident Virus inserts itself in a computer system’s memory. It is
hard to identify the virus, and it is equally tough to remove it.
4.160
Virus types
Multipartite Virus
The Multipartite Virus infects and spreads in multiple ways. This
virus infects both the program files and the system sectors.
Polymorphic Virus
A Polymorphic Virus is more capable of altering its signature
pattern whenever it replicates thereby rendering it hard to be
detected
4.161
Virus types
Overwrite Virus
As the name suggests, an Overwrite Virus spreads through emails and
deletes all the files it infects.
4.163
How does Antivirus works
4.164
Network Routing
4.165
Network Routing
Hop count
In networking, a hop count is the total number of intermediate
devices such as routers through which a given piece of data must
pass between the source and destination, instead of flowing
directly over a single wire.
Bandwidth
is the capacity of a wired or wireless network communications
link to transmit the maximum amount of data from one point to
another over a computer network or internet connection in a
given amount of time -- usually, one second.
4.166
Network Routing
Metric
A metric is a value that is assigned to an IP route for a particular
network interface that identifies the cost that is associated with
using that route. ... The Automatic Metric feature can be useful
when the routing table contains multiple routes for the same
destination
prefix length
The prefix-length is a decimal value indicating the number of
leftmost contiguous bits of the address. It identifies the prefix
(that is, the network portion) of the address.
4.167
Network Routing
Delay
The delay of a network specifies how long it takes for a bit of
data to travel across the network from one communication
endpoint to another. It is typically measured in multiples or
fractions of seconds.
4.168
Routing types
Unicast routing
Most of the traffic on the internet and intranets known as
unicast data or unicast traffic is sent with specified destination. It
is simplest form of routing because the destination is already
known. In it router just has to look up the routing table and
forward the packet to next hop.
4.169
Routing types
Broadcast Routing
There are two types of broadcast routing
1- A router creates a data packet and then send it to each host one by
one.in this case the router creates multiple copies of single data packet
with different destination addresses. All packets are sent as unicast but
because they are sent to all , it simulates as if router is broadcasting.
This method consume lots of bandwidth.
Broadcast Routing
4.171
Routing types
Multicast Routing
Multicast routing is special case of broadcast routing with
significant difference and challenges. In broadcast routing,
packets are send to all nodes even if they don’t want it. but in
multicast routing the data is sent to only nodes which wants to
receive the packets.
Multicast routing works spanning tree protocol to avoid looping.it
also uses reverse path forwarding techniques, to detect and
discard duplicate and loops.
4.172
Routing types
Multicast Routing
.
4.173
Routing types
Anycast Routing
Anycast packet forwarding is a mechanism where multiple hosts
can have some logical address. When a packet destined to this
logical address is received , it is sent to the host which is nearest in
routing topology
4.174
Routing algorithm
Flooding
Flooding is simplest method packet forwarding. When a packet is
received, the routers send it to all the interfaces except the one on
which it was received. This creates too much burden on the
network and lots of duplicate packets wandering in the network.
4.175
Routing algorithm
Shortest Path
Routing decision in networks, are mostly taken on the basis of cost
between source and destination. Hop count plays major role here.
Shortest path is a technique which uses various algorithms to
decide a path with minimum number of hops.
Common shortest path algorithms are:
• Dijkstra's algorithm
• Bellman Ford algorithm
• Floyd Warshall algorithm
4.176
UDP
4.177
UDP
4.178
UDP
4.179
UDP Header
4.180
UDP Header
4.181
UDP Header
Length
This field specifies the length in bytes of the UDP header and
UDP data. The minimum length is 8 bytes, the length of the
header. The field size sets a theoretical limit of 65,535 bytes (8
byte header + 65,527 bytes of data) for a UDP datagram.
However the actual limit for the data length, which is imposed
by the underlying IPv4 protocol, is 65,507 bytes (65,535 − 8 byte
UDP header − 20 byte IP header).
4.182
UDP Header
checksum
The checksum field may be used for error-checking of the
header and data. This field is optional in IPv4, and mandatory
in IPv6
4.183
UDP features
4.184
UDP features
4.186
Memory
4.187
RAM
Dynamic random access memory gets its name form the fact
that is must be refreshed frequently (refreshing mean
recharging the RAM chip with electricity) as it must be
recharged many times each second or they will lose their
contents. So DRAM recharge it self after every 10neno seconds
it mean it consume its lots of time in frequently in recharging
process so it is less efficient as compared to SRAM
4.189
SRAM
4.190
ROM
Static Non volatile chips always hold the same data which
cannot be changed except through a special process that
overwrite the data. In fact putting data permanently into this
kind of memory is called burning in the data. During normal
use the data in these chips is only read and used not changed
so the memory is called read only memory.
One important reasons a computer needs ROM is that it must
know what to do when the computer power is first turned on.
Among other things ROM contain a set of start up instructions
which ensures that the rest of memory is functioning properly
4.191
PROM
4.192
EPROM
4.193
EEPROM
4.194
Cache Memory
4.195
Virtual Memory
4.196
Storage Devices
4.197
Magnetic Tape
4.198
Magnetic Tape
4.199
Magnetic tape
4.200
Storage Devices
IBG
Inter block gap this technique is used to increase the accessing
speed and storage capacity of magnetic tape as the data and
record are stored on the blocked tape in the form of blocks
4.201
Storage Devices
IRG
Short for inter record gap, the space between two consecutive
physical blocks on a data recording medium, such as a hard
drive or a magnetic tape. IRGs are used as markers for the end
of data and also as safety margins for data overwrites.
4.202
Magnetic tape
When you want to access a specific set of data on the tape the
drive have to scan through all the data you do not need to get
to the data you want. The result is a slow access time. In fact
the access time varies depending on the speed of the drive,
length of tape and the position of required stuff. The amounts
of data that can be stored on a tape depend on the length and
the density of tape. Magnetic tapes are used in different sizes
200, 600, 1200 and 2400 feet in length as on 2400 feet reel 120
million characters can be stored.
4.203
Hard disk
It is a magnetic disk device used to store data with large capacity that
provide quick access to large amount of data on electromagnetically
charged surface or set of surfaces. the hard disk can store data up to
TB .Every hard disk has two heads known as read head and writes
heads used to retrieve and store data respectively. Two heads one on
each side of a disk read or writes the data as the disk spin. A hard disk
comes with a set rotation speed varying from 4500 to 7200 rmp
revolution per minute. Hard disk contain many concentric tracks
which are further divided into sectors where the data is stored
actually whereas every sector has its own unique address to which it
follow when it read or right data. A little jolt can spoil the hard disk
which causes the destruction of stuff available in hard disk
4.204
Optical disk
It is called compact disk ,available in both 5.25 and 2.5 inches. It uses
the laser technology to store data. Laser is highly concentrated beam
of light it makes close tracks on the disk as a result the optical disk
has very high storage capacity as its storage capacity is more then 600
MB as optical disk is removable it can be moved from computer to
computer. And the data on is disk is safe and it can not be corrupted
by magnetic fields. The optical disk was originally developed for
videos and audio software and software application. The data is
stored on it in Tiny Pits with the laser beam as the presence of pit
show 1 and absence 0 as this beam is also used to read the data from
optical disk. But the data accessing speed of optical disk is slower as
compared to hard disk
4.205
IP addressing and Sub netting
4.206
IP addressing and Sub netting
Here the classes range from {A, B, C, D, and E} but we use the classes
often up to C.
IP has two parts 1-Network Part 2-Host Part
1 show the network part 0 show the host part
Class A
Class Range Sub mask address
Class A 1 . 0 . 0 . 0 255. 0. 0. 0
127. 255. 255. 255
Network portion host portion
So # of networks in class A = 127 – 1 = 126
And # of hosts per network = 255 * 255 * 255 = 16581375
4.208
Classes
Class B
4.209
Classes
Class C
Class Range Sub mask address
Class C 192. 0 . 0 . 0 255. 255. 255. 0
223 .255 .255 .255
4.210
Classes
The range of network is from 0 to 255 and the first address is known as
base address or networks address that is address of network while second
address is known as router address because it contain the address of next
router to which it will transfer the data for routing while last address is
known as broad cast address which we use to send the data or information
to the whole network so we cant use these three address for example
202. 68. 73 . 0 here 0 is network address
.1 1 is router address
.
.
202. 68. 73. 255 Here 255 is Broadcast address
4.211
Sub netting
Sub Netting
As we know that in every Class we waist the resources for example we use
class C that have the capability to hold 255 computers in one network but
mostly we use 60-100 range computer so we can add 155 computer more but
we don’t have so we use the resources. So to avoid from this wastage we
convert the network into sub network so that we can avoid to waist
resources. This phenomenon is called sub netting.
4.212
Sub netting
4.213
Sub netting