Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Analog and Digital Communication w/ e.g.

Five Network Topologies OSI model , Layers & Functions


Analog Communication :- Mesh Topology: In mesh topology each device is connected to OSI stands for Open System Interconnection is a reference model
1. Analog communication uses analog signals for the transmission every other device on the network through a dedicated that describes how information from a software application in
of information. point-to-point link. When we say dedicated it means that the link one computer moves through a physical medium to the software
2. Analog communications are affected by noise. only carries data for the two connected devices only. application in another computer.
3. Analog communication requires complicated hardware. >Adv : No data loss: No data traffic issues as there is a dedicated OSI model divides the whole task into seven smaller and
4. Low bandwidth is required for analog communication. link between two devices which means the link is only available manageable tasks. Each layer is assigned a particular task.
5. High power is required for analog communication. for those two devices.
6. Examples: - Sound shows analog signals >Disadv: Amount of wires required to connected each system is
Digital communication :- tedious and headache.
1. Digital communication uses digital signals for the transmission
of information.
2. Digital communications are not affected by noise.
3. Digital communication requires less complicated hardware.
4. High bandwidth is required for digital communication.
5. Digital communication requires comparatively less power.
6. Examples: - Computers use digital signals.

Synchronous and Asynchronous Transmission


1. In Synchronous transmission, data is sent in form of blocks or
frames.
2. Synchronous transmission is fast.
3. Synchronous transmission is costly. Star Topology
4. In Synchronous transmission, the time interval of transmission In star topology each device in the network is connected to a
is constant. central device called hub. Unlike Mesh topology, star topology
5. In Synchronous transmission, there is no gap present between doesn’t allow direct communication between devices, a device
data. must have to communicate through hub. OSI consists of seven layers, and each layer performs a particular
1. In Asynchronous transmission, data is sent in form of bytes or If one device wants to send data to other device, it has to first network function :
characters. send the data to hub and then the hub transmit that data to the 1. Physical Layer:
2. Asynchronous transmission is slow. designated device. Line Configuration: It defines the way how two or more devices
3. Asynchronous transmission is economical. >Adv: Less expensive: Less expensive because each device only can be connected physically.
4. In Asynchronous transmission, the time interval of need one I/O port and needs to be connected with hub with one Data Transmission: It defines the transmission mode whether it is
transmission is not constant, it is random. link. simplex, half-duplex or full-duplex mode between the two
5. In Asynchronous transmission, there is present a gap between >Disadv: If hub goes down everything goes down, none of the devices on the network.
data. devices can work without hub. 2. Data-Link Layer:
Physical Addressing: The Data link layer adds a header to the
Frequency modulation, Advantages & Disadvantages frame that contains a destination address. The frame is
Frequency modulation is a technique or a process of encoding transmitted to the destination address mentioned in the header.
information on a particular signal (analogue or digital) by varying Access Control: When two or more devices are connected to the
the carrier wave frequency in accordance with the frequency of same communication channel, then the data link layer protocols
the modulating signal. are used to determine which device has control over the link at a
Advantages :- given time.
Less interference and noise. 3. Network Layer:
Power Consumption is less as compared to AM. Internetworking: An internetworking is the main responsibility of
Adjacent FM channels are separated by guard bands. the network layer. It provides a logical connection between
Disadvantages:- different devices.
Equipment cost is higher. Has a large bandwidth. Bus Topology Addressing: A Network layer adds the source and destination
More complicated receiver and transmitter. In bus topology there is a main cable and all the devices are address to the header of the frame. Addressing is used to identify
The antennas for FM systems should be kept close for better connected to this main cable through drop lines. There is a the device on the internet.
communication. device called tap that connects the drop line to the main cable. 4. Transport Layer:
Since all the data is transmitted over the main cable. Flow control: The transport layer also responsible for flow
Problem with PSK ? 4-QPSK & 8 QPSK ? >Adv: Easy installation, each cable needs to be connected with control but it is performed end-to-end rather than across a single
The problem with phase shift keying is that the receiver cannot backbone cable. link.
know the exact phase of the transmitted signal to determine >Disadv: Difficultly in fault detection. Error control: The transport layer is also responsible for Error
whether it is in a mark or space condition. This would not be control. Error control is performed end-to-end rather than across
possible even if the transmitter and receiver clocks were the single link. The sender transport layer ensures that message
accurately linked because the path length would determine the reach at the destination without any error.
exact phase of the received signal. To overcome this problem PSK 5. Session Layer:
systems use a differential method for encoding the data onto the Dialog control: Session layer acts as a dialog controller that
carrier. creates a dialog between two processes or we can say that it
QPSK, or Quadrature Phase-Shift Keying, uses four distinct allows the communication between two processes which can be
phase-shifts to encode data. In contrast, 8PSK, or Eight either half-duplex or full-duplex.
Phase-Shift Keying, uses eight distinct phase-shifts. These occur Synchronization: Session layer adds some checkpoints when
at 0 degrees, 45 degrees, 90 degrees, 135 degrees, 180 degrees, transmitting the data in a sequence. If some error occurs in the
225 degrees, 270 degrees and 315 degrees. Ring Topology middle of the transmission of data, then the transmission will
In ring topology each device is connected with the two devices take place again from the checkpoint. This process is known as
Advantages of packet switching over circuit switching on either side of it. There are two dedicated point to point links Synchronization and recovery.
Packet switching is most often used for data and voice a device has with the devices on the either side of it. This 6. Presentation Layer:
applications that aren’t time-sensitive. structure forms a ring thus it is known as ring topology. Translation: the presentation layer handles the interoperability
Advantages of packet switching over circuit switching: >Adv: Less expensive: Generally Twisted pair cabling is used in between the different encoding methods. It converts the data
More efficient than circuit switching ring topology which is inexpensive and easily available. from sender-dependent format into a common format and
Data packets are able to find the destination without the use of a >Disadv : A link failure can fail the entire network as the signal changes the common format into receiver-dependent format at
dedicated channel will not travel forward due to failure. the receiving end.
Reduces lost data packets because packet switching allows for Encryption: Encryption is needed to maintain privacy. Encryption
resending of packets is a process of converting the sender-transmitted information
More cost-effective since there is no need for a dedicated into another form and sends the resulting message over the
channel for voice or data traffic network.
7. Application Layer:
Fiber Optic Cables File transfer, access, and management (FTAM): An application
A fibre optic cable is made of glass or plastic and transmits signals layer allows a user to access the files in a remote computer, to
in the structure of light signals. The structure of an optical fiber retrieve the files from a computer and to manage the files in a
cable is displayed in the figure. It involves an inner glass core remote computer.
surrounded by a glass cladding that reflects the light into the Mail services: An application layer provides the facility for email
core. Each fibre is encircled by a plastic jacket. forwarding and storage.

TCP/IP
Hybrid Topology TCP/IP Reference Model is a four-layered suite of communication
A combination of two or more topology is known as hybrid protocols.It is named after the two main protocols that are used
topology. For example a combination of star and mesh topology is in the model, namely, TCP and IP. TCP stands for Transmission
known as hybrid topology. Control Protocol and IP stands for Internet Protocol.
>Adv: We can choose the topology based on the requirement for The four layers in the TCP/IP protocol suite are:
example, scalability is our concern then we can use star topology 1. Host-to- Network Layer
instead of bus technology. 2. Internet Layer
>Disadv : Design is complex so maintenance is high thus 3. Transport Layer
expensive. 4. Application Layer

MD5 Algorithm
MD5 is a cryptographic hash function algorithm that takes the
message as input of any length and changes it into a fixed-length
message of 16 bytes. MD5 algorithm stands for the message-digest
algorithm.
The output of MD5 (Digest size) is always 128 bits.
Use Of MD5 Algorithm:
It is used for file authentication.
In a web application, it is used for security purposes. e.g. Secure
password of users etc.
Using this algorithm, We can store our password in 128 bits Privacy and Authentication
format. The data being transmitted via GSM is in digital form and hence is
much easier to carry out digital transformation, data encryption,
scrambling and other known methods of protection against
unauthorized access to transmitted information. i.e. Privacy
We system needs to verify before connecting two terminals if the
connection has been tapped or compromised and that the
authorized user is at both the ends of connection i.e.
Authentication.
Go-back-sliding window protocol Transparent Fragmentation vs Non-Transparent Steps of Silly window Syndrome w Diagram
Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Fragmentation Sender windows transmit one byte of data repeatedly
Repeat Request. It is a data link layer protocol that uses a sliding Transparent fragmentation is done by one network is made Step 1 − If an application which will generate only one byte of
window method. In this, if any frame is corrupted or lost, all transparent to all other subsequent networks through which data. The TCP will transmit this small segment of data.
subsequent frames have to be sent again. packet will pass. Whenever a large packet arrives at a gateway, it Step 2 − All time the application generates a single byte of data
The size of the sender window is N in this protocol. For example, breaks packet into smaller fragments as shown in the following and the window transmits it.
Go-Back-8, the size of the sender window, will be 8. The receiver figure gateway G1 breaks a packet into smaller fragments. Step 3 − This is because the transmission process becomes slow
window size is always 1. and inefficient. Here the sender window transmits one byte of
If the receiver receives a corrupted frame, it cancels it. The data repeatedly.
receiver does not accept a corrupted frame. When the timer
expires, the sender sends the correct frame again. Receiver window accepting one byte of data repeatedly
Step 1 − Suppose the receiver is not able to process all the
Pure ALOHA & SLOTTED ALOHA Comparison incoming data.
Step 2 − In such a case, the receiver advertises a small window
size.
Step 3 − The process repeats and the window size becomes too
small.
Step 4 − Thus, the receiver repeatedly advertises window size of
After this, each fragment is going to address to same exit one byte.
gateway. Exist gateway of a network reassembles or recombines Step 5 − Finally, the receiving process becomes slow and
all fragments example is shown in the above figure as exit inefficient.
gateway, G2 of network 1 recombines all fragments created by G1 Fra
before passing them to network 2. Thus, subsequent network is
not aware that fragmentation has occurred. This type of strategy
is used by ATM networks .
Non-Transport fragmentation is done by one network is
non-transparent to the subsequent networks through which a
packet passes. Packet fragmented by a gateway of a network is
not recombined by exit gateway of same network as shown in the
below figure.

Digital Modulation comparison of ASK, PSK & FSK


Digital Modulation provides more information capacity, high data
security, quicker system availability with great quality
communication. Hence, digital modulation techniques have a
greater demand, for their capacity to convey larger amounts of
data than analog modulation techniques.
ASK – Amplitude Shift Keying
The amplitude of the resultant output depends upon the input
data whether it should be a zero level or a variation of positive Once a packet is fragmented, each fragment is treated as original
and negative, depending upon the carrier frequency. packet. All fragments of a packet are passed through exit
gateway and recombination of these fragments is done at the
FSK – Frequency Shift Keying destination host.
The frequency of the output signal will be either high or low, Frame Relay architecture w Diagram
depending upon the input data applied. Categories of ICMP Frame relay is a protocol that defines how frames are routed
ICMP stands for Internet Control Message Protocol. IP does not through a fast-packet network based on the address field in the
PSK – Phase Shift Keying have an inbuilt mechanism for sending error and control frame. Frame relay takes advantage of the reliability of data
The phase of the output signal gets shifted depending upon the messages. It depends on Internet Control Message Protocol(ICMP) communications networks to minimize the error checking done
input. These are mainly of two types, namely Binary Phase Shift to provide an error control. It is used for reporting errors and by the network nodes.
Keying BPSK and Quadrature Phase Shift Keying QPSK, according management queries. It is a supporting protocol and is used by
to the number of phase shifts. networks devices like routers for sending error messages and
operations information., e.g. the requested service is not
CRC available or that a host or router could not be reached.
The Cyclic Redundancy Checks (CRC) is the most powerful These message types can be divided into two categories −
method for Error-Detection and Correction. It is given as a kbit Error Reporting Messages- These are messages which are sent
message and the transmitter creates an (n – k) bit sequence when an error is reported by ICMP protocol.
called frame check sequence. The out coming frame, including n Query Messages - These are messages which are sent when ICMP
bits, is precisely divisible by some fixed number. Modulo 2 queries about the status of the host.
Arithmetic is used in this binary addition with no carries, just like
the XOR operation. IGMP, Draw a header field of IGMP
It should have accurately one less bit than the divisor. IGMP is acronym for Internet Group Management Protocol. IGMP is
Joining it to the end of the data unit should create the resulting a communication protocol used by hosts and adjacent routers for
bit sequence precisely divisible by the divisor. multicasting communication with IP networks and uses the
resources efficiently to transmit the message/data packets.
ARP & RARP Works IGMP can be used in streaming videos, gaming or web
ARP stands for Address Resolution Protocol.Arp translates IP conferencing tools. This protocol is used on IPv4 networks and
numbers into hardware addresses. for using this on IPv6, multicasting is managed by Multicast
How ARP works: Send a packet from the querying host with an ATM Cell
Listener Discovery (MLD).
Ethernet broadcast address asking the target host with the given Asynchronous Transfer Mode (ATM) is a cell-switching,
IP address to respond. All hosts on the physical network receive connection-oriented technology. In ATM networks, end stations
this packet, and the one with the given IP number responds. attach to the network using dedicated full duplex connections.
Then the original querying host knows the physical address of the The ATM networks are constructed using switches, and switches
target host. Does not use IP; uses's physical frames. are interconnected using dedicated physical connections.
An ATM cell consists of a 5-byte header and a 48-byte payload.
RARP stands for Reverse Address Resolution Protocol. The payload size of 48 bytes was chosen as described above. ATM
What is it for: Diskless clients don't have a place to store there IP defines two different cell formats: user–network interface (UNI)
number. Rarp translates machines addresses into IP numbers. and network–network interface (NNI). Most ATM links use UNI cell
3-Way Handshake Connection Establishment Process format.
How RARP works: The client broadcasts a RARP packet with an Transmission Control Protocol (TCP) provides a secure and
ethernet broadcast address, and it's own physical address in the reliable connection between two devices using the 3-way
data portion. The server responds by telling the client it's IP IPv4 & IPv6
handshake process. TCP uses the full-duplex connection to
address. Note there is no name sent. Also note there is no IPv4:
synchronize (SYN) and acknowledge (ACK) each other on both
security. Does not use IP; uses's physical frames. 1. IPv4 has a 32-bit address length.
sides.
2. It Supports Manual and DHCP address configuration
The following diagram shows how a reliable connection is
Network Interface Card 3. In IPv4 end to end, connection integrity is Unachievable
established using 3-way handshake. It will support
A NIC provides a computer with a dedicated, full-time connection 4. In IPv4 checksum field is available
communication between a web browser on the client and server
to a network. It implements the physical layer circuitry necessary 5.IPv4 has a header of 20-60 bytes.
sides whenever a user navigates the Internet.
for communicating with a data link layer standard, such as 6. IPv4 consist of 4 fields which are separated by dot (.)
Ethernet or Wi-Fi. Each card represents a device and can 7. Example of IPv4: 66.94.29.13
prepare, transmit and control the flow of data on the network. IPv6:
One such example of a wireless network NIC card is fiber data 1. IPv6 has a 128-bit address length
digital interface FDDI. 2. It supports Auto and renumbering address configuration.
NIC cards are of two types − 3. In IPv6 end to end, connection integrity is Achievable
1. Internal Network Cards 4. In IPv6 checksum field is not available.
2. External Network Cards 5. IPv6 has header of 40 bytes fixed.
6. IPv6 consist of 8 fields, which are separated by colon (:)
Distance Vector Routing Protocol, diagram & Algorithm 7. Example of IPv6: 2001:0000:3238:DFE1:0063:0000:0000:FEFB
A distance-vector routing (DVR) protocol requires that a router
inform its neighbors of topology changes periodically. Historically What is CSMA/CD ?
known as the old ARPANET routing algorithm (or known as Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Bellman-Ford algorithm). is a network protocol for carrier transmission that operates in the
Bellman Ford Basics – Each router maintains a Distance Vector Medium Access Control (MAC) layer. It senses or listens whether
table containing the distance between itself and ALL possible the shared channel for transmission is busy or not, and defers
destination nodes. Distances,based on a chosen metric, are transmissions until the channel is free. The collision detection
computed using information from the neighbors’ distance technology detects collisions by sensing transmissions from other
vectors. stations. On detection of a collision, the station stops
Dx(y) = min { C(x,v) + Dv(y), Dx(y) } for each node y ∈ N transmitting, sends a jam signal, and then waits for a random
Example – Consider 3-routers X, Y and Z as shown in figure. Each time interval before retransmission.
router have their routing table. Every routing table will contain
distance to the destination nodes.
Block Cipher Adv. & Disadv IMAP
Block cipher is an encryption algorithm that takes a fixed size of In computing, the Internet Message Access Protocol is an
input say b bits and produces a ciphertext of b bits again. If the Internet standard protocol used by email clients to retrieve email
input is larger than b bits it can be divided further. For different messages from a mail server over a TCP/IP connection. IMAP is
applications and uses, there are several modes of operations for a defined by RFC 9051.
block cipher.
Advantages Features of IMAP :
Saves up on memory and communication bandwidth It is capable of managing multiple mailboxes and organizing them
-Easy to incorporate within existing systems. into various categories.
Main Disadvantage Provides adding of message flags to keep track of which messages
-Every block is always encrypted in the same way. are being seen.
Important Examples:DES,AES. It is capable of deciding whether to retrieve email from a mail
server before downloading.
Subnetting ? subnetwork address It makes it easy to download media when multiple files are
Subnetting is the strategy used to partition a single physical attached.
network into more than one smaller logical sub-networks
(subnets).Subnetting allows an organization to add sub-networks
without the need to acquire a new network number via the
Internet service provider (ISP). Subnetting helps to reduce the
network traffic and conceals network complexity. Subnetting is
essential when a single network number has to be allocated over
numerous segments of a local area network (LAN).

A subnet address is the IP address assigned by the DHCP server or


the network admin when subnetting. Basically if you have
10.0.0.0 as the base network IP, a subnet of it could be 10.1.0.0
and then an actual IP address for a device in that subnet would
be 10.1.0.15.

Count to infinity Problem


The Count to Infinity problem arises from the routing loop in this
Distance Vector Routing(DVR) network. Such Routing Loops
usually occurs when 2 routers send an update together at the
same time or when an interface goes down. Advantages :
The crux of the Count to Infinity problem is that if node A tells -It offers synchronization across all the maintained sessions by
node B that it has a path somewhere, there is no way for node B the user.
to know if the path has node B as a part of it. -It provides security over POP3 protocol as the email only exists
on the IMAP server.
-Users have remote access to all the contents.
-It offers easy migration between the devices as it is
synchronized by a centralized server.
-There is no need to physically allocate any storage to save
contents.

Disadvantages :
-IMAP is complex to maintain.
Consider the case in the above diagram, where the connection -Emails of the user are only available when there is an internet
between B and C gets disconnected. In this case, B will know that connection.
it cannot get to C at a cost of 1 anymore and update its table -It is slower to load messages.
accordingly.However, it can be possible that A sends some -Some emails don’t support IMAP which makes it difficult to
information to B that it is possible to reach C from A at a cost of manage.
2. Then, since B can reach A at a cost of 1, B will erroneously -Many browser-based solutions are unavailable due to not support
update its table that it can reach C via A at a cost of 1 + 2 = 3 of IMAP
units. A will then receive updates from B and update its costs to
4, and so on. Thus, the process enters into a loop of bad
MD5 Algorithm
feedback and the cost shoots towards infinity. This entire MD5 is a cryptographic hash function algorithm that takes the
situation is called the Count to Infinity problem. message as input of any length and changes it into a fixed-length
message of 16 bytes. MD5 algorithm stands for the message-digest
Encryption algorithm. MD5 was developed as an improvement of MD4, with
In cryptography, encryption is the process of encoding advanced security purposes. The output of MD5 (Digest size) is
informationEncryption is the method by which information is always 128 bits. MD5 was developed in 1991 by Ronald Rivest.
converted into secret code that hides the information's true It is used for file authentication.
meaning. The science of encrypting and decrypting information is In a web application, it is used for security purposes. e.g. Secure
called cryptography. password of users etc.
This process converts the original representation of the
information, known as plaintext, into an alternative form known ATM Cell
as ciphertext. Ideally, only authorized parties can decipher a ATM transfers data in fixed-size units are known as cells. Each
ciphertext back to plaintext and access the original information cell includes 53 octets or bytes, as shown in the figure. The first
5 bytes contain cell-header data, and the remaining 48 include
Decryption the payload (user information).
Decryption is a process that transforms encrypted information An ATM cell header can be two formats, such as User Network
into its original format. Interface (UNI) or Network to Network Interface (NNI). The UNI
The process of encryption transforms information from its header can be used for communication between ATM endpoints
original format — called plaintext — into an unreadable format — and ATM switches in private ATM networks. The NNI header can
called ciphertext — while it is being shared or transmitted. be used for communication between ATM switches.

Difference encryption and Decryption

Encryption
1. Encryption is the process of converting normal message into
meaningless message
2.Encryption is the process which take place at sender’s end
3.Its major task is to convert the plain text into cipher text.
4.Any message can be encrypted with either secret key or public
key.
5.In encryption process, sender sends the data to receiver after
encrypted it.
6.The same algorithm with the same key is used for the
encryption-decryption process

Decryption
1.While decryption is the process of converting meaningless
message into its original form.
2.While decryption is the process which take place at receiver’s
end.
3.While its main task is to convert the cipher text into plain text.
4.Whereas the encrypted message can be decrypted with either
secret key or private key.
5.Whereas in decryption process, receiver receives the
information(Cipher text) and convert into plain text.
6.The only single algorithm is used for encryption-decryption
with a pair of keys where each use for encryption and
decryption.

RSA SHORT NOTE


It was invented by Rivest, Shamir and Adleman in year 1978 and
hence name RSA algorithm.
RSA algorithm is asymmetric cryptography algorithm. Asymmetric
actually means that it works on two different keys i.e. Public Key
and Private Key. As the name describes that the Public Key is
given to everyone and Private key is kept private.
RSA is still seen in a range of web browsers, email, VPNs, chat
and other communication channels. RSA is also often used to
make secure connections between VPN clients and VPN servers.

You might also like