Professional Documents
Culture Documents
Bcs-41 Jadi Buti
Bcs-41 Jadi Buti
TCP/IP
Hybrid Topology TCP/IP Reference Model is a four-layered suite of communication
A combination of two or more topology is known as hybrid protocols.It is named after the two main protocols that are used
topology. For example a combination of star and mesh topology is in the model, namely, TCP and IP. TCP stands for Transmission
known as hybrid topology. Control Protocol and IP stands for Internet Protocol.
>Adv: We can choose the topology based on the requirement for The four layers in the TCP/IP protocol suite are:
example, scalability is our concern then we can use star topology 1. Host-to- Network Layer
instead of bus technology. 2. Internet Layer
>Disadv : Design is complex so maintenance is high thus 3. Transport Layer
expensive. 4. Application Layer
MD5 Algorithm
MD5 is a cryptographic hash function algorithm that takes the
message as input of any length and changes it into a fixed-length
message of 16 bytes. MD5 algorithm stands for the message-digest
algorithm.
The output of MD5 (Digest size) is always 128 bits.
Use Of MD5 Algorithm:
It is used for file authentication.
In a web application, it is used for security purposes. e.g. Secure
password of users etc.
Using this algorithm, We can store our password in 128 bits Privacy and Authentication
format. The data being transmitted via GSM is in digital form and hence is
much easier to carry out digital transformation, data encryption,
scrambling and other known methods of protection against
unauthorized access to transmitted information. i.e. Privacy
We system needs to verify before connecting two terminals if the
connection has been tapped or compromised and that the
authorized user is at both the ends of connection i.e.
Authentication.
Go-back-sliding window protocol Transparent Fragmentation vs Non-Transparent Steps of Silly window Syndrome w Diagram
Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Fragmentation Sender windows transmit one byte of data repeatedly
Repeat Request. It is a data link layer protocol that uses a sliding Transparent fragmentation is done by one network is made Step 1 − If an application which will generate only one byte of
window method. In this, if any frame is corrupted or lost, all transparent to all other subsequent networks through which data. The TCP will transmit this small segment of data.
subsequent frames have to be sent again. packet will pass. Whenever a large packet arrives at a gateway, it Step 2 − All time the application generates a single byte of data
The size of the sender window is N in this protocol. For example, breaks packet into smaller fragments as shown in the following and the window transmits it.
Go-Back-8, the size of the sender window, will be 8. The receiver figure gateway G1 breaks a packet into smaller fragments. Step 3 − This is because the transmission process becomes slow
window size is always 1. and inefficient. Here the sender window transmits one byte of
If the receiver receives a corrupted frame, it cancels it. The data repeatedly.
receiver does not accept a corrupted frame. When the timer
expires, the sender sends the correct frame again. Receiver window accepting one byte of data repeatedly
Step 1 − Suppose the receiver is not able to process all the
Pure ALOHA & SLOTTED ALOHA Comparison incoming data.
Step 2 − In such a case, the receiver advertises a small window
size.
Step 3 − The process repeats and the window size becomes too
small.
Step 4 − Thus, the receiver repeatedly advertises window size of
After this, each fragment is going to address to same exit one byte.
gateway. Exist gateway of a network reassembles or recombines Step 5 − Finally, the receiving process becomes slow and
all fragments example is shown in the above figure as exit inefficient.
gateway, G2 of network 1 recombines all fragments created by G1 Fra
before passing them to network 2. Thus, subsequent network is
not aware that fragmentation has occurred. This type of strategy
is used by ATM networks .
Non-Transport fragmentation is done by one network is
non-transparent to the subsequent networks through which a
packet passes. Packet fragmented by a gateway of a network is
not recombined by exit gateway of same network as shown in the
below figure.
Disadvantages :
-IMAP is complex to maintain.
Consider the case in the above diagram, where the connection -Emails of the user are only available when there is an internet
between B and C gets disconnected. In this case, B will know that connection.
it cannot get to C at a cost of 1 anymore and update its table -It is slower to load messages.
accordingly.However, it can be possible that A sends some -Some emails don’t support IMAP which makes it difficult to
information to B that it is possible to reach C from A at a cost of manage.
2. Then, since B can reach A at a cost of 1, B will erroneously -Many browser-based solutions are unavailable due to not support
update its table that it can reach C via A at a cost of 1 + 2 = 3 of IMAP
units. A will then receive updates from B and update its costs to
4, and so on. Thus, the process enters into a loop of bad
MD5 Algorithm
feedback and the cost shoots towards infinity. This entire MD5 is a cryptographic hash function algorithm that takes the
situation is called the Count to Infinity problem. message as input of any length and changes it into a fixed-length
message of 16 bytes. MD5 algorithm stands for the message-digest
Encryption algorithm. MD5 was developed as an improvement of MD4, with
In cryptography, encryption is the process of encoding advanced security purposes. The output of MD5 (Digest size) is
informationEncryption is the method by which information is always 128 bits. MD5 was developed in 1991 by Ronald Rivest.
converted into secret code that hides the information's true It is used for file authentication.
meaning. The science of encrypting and decrypting information is In a web application, it is used for security purposes. e.g. Secure
called cryptography. password of users etc.
This process converts the original representation of the
information, known as plaintext, into an alternative form known ATM Cell
as ciphertext. Ideally, only authorized parties can decipher a ATM transfers data in fixed-size units are known as cells. Each
ciphertext back to plaintext and access the original information cell includes 53 octets or bytes, as shown in the figure. The first
5 bytes contain cell-header data, and the remaining 48 include
Decryption the payload (user information).
Decryption is a process that transforms encrypted information An ATM cell header can be two formats, such as User Network
into its original format. Interface (UNI) or Network to Network Interface (NNI). The UNI
The process of encryption transforms information from its header can be used for communication between ATM endpoints
original format — called plaintext — into an unreadable format — and ATM switches in private ATM networks. The NNI header can
called ciphertext — while it is being shared or transmitted. be used for communication between ATM switches.
Encryption
1. Encryption is the process of converting normal message into
meaningless message
2.Encryption is the process which take place at sender’s end
3.Its major task is to convert the plain text into cipher text.
4.Any message can be encrypted with either secret key or public
key.
5.In encryption process, sender sends the data to receiver after
encrypted it.
6.The same algorithm with the same key is used for the
encryption-decryption process
Decryption
1.While decryption is the process of converting meaningless
message into its original form.
2.While decryption is the process which take place at receiver’s
end.
3.While its main task is to convert the cipher text into plain text.
4.Whereas the encrypted message can be decrypted with either
secret key or private key.
5.Whereas in decryption process, receiver receives the
information(Cipher text) and convert into plain text.
6.The only single algorithm is used for encryption-decryption
with a pair of keys where each use for encryption and
decryption.