Data Communication 88
Data Communication 88
Data Communication 88
Data Communication
and Networking
Study Notes
www.byjusexamprep.com
2
www.byjusexamprep.com
Note:
a. In bus topology at the first, the message will go through the bus then one user can
communicate with other.
b. The drawback of this topology is that if the network cable breaks, the entire network
will be down.
• Star Topology :
Star topology is a network topology where each individual piece of a network is attached to
a central node (often called a hub or switch).
The attachment of these network pieces to the central component is visually represented in a
form similar to a star.
3
www.byjusexamprep.com
• Ring Topology:
Ring topology is a type of network topology where each node is exactly connected to
two other nodes, forward and backward, thus forming a single continuous path for
signal transmission.
Note:
Two types of the Ring Topology based on the data flow:
Unidirectional: A Unidirectional ring topology handles data traffic in either clockwise
or anticlockwise direction. This data network, thus, can also be called as a half-duplex
network.
Bi-directional: A Unidirectional ring topology is thus easy to maintain compared to
the bidirectional ring topology.
• Mesh Topology:
Each system is connected to all other systems in the network.
4
www.byjusexamprep.com
• Tree Topology:
A tree topology is a special type of structure in which many connected elements are arranged
like the branches of a tree.
Note:-
• In bus topology at first, the message will go through the bus then one user can
communicate with others.
• In star topology, first, the message will go to the hub then that message will go to
another user.
• In-ring topology, user can communicate as randomly.
• In a mesh topology, any user can directly communicate with other users.
Hardware/Networking Devices
Networking hardware may also be known as network equipment computer networking devices.
• Network Interface Card (NIC): NIC provides a physical connection between the
networking cable and the computer's internal bus. NICs come in three basic varieties 8
bit, 16 bit and 32 bit. The larger the number of bits that can be transferred to NIC, the
faster the NIC can transfer data to the network cable.
• Repeater: Repeaters are used to connect together two Ethernet segments of any media
type. In larger designs, signal quality begins to deteriorate as segments exceed their
maximum length. We also know that signal transmission is always attached to energy
loss. So, a periodic refreshing of the signals is required.
• Hubs: Hubs are actually multi-part repeaters. A hub takes any incoming signal and
repeats it out all ports.
• Bridges: When the size of the LAN is difficult to manage, it is necessary to break up
the network. The function of the bridge is to connect separate networks together.
Bridges do not forward bad or misaligned packets.
5
www.byjusexamprep.com
• Switch: Switches are an expansion of the concept of bridging. Cut through switches
examine the packet destination address, only before forwarding it onto its destination
segment, while a store and forward switch accept and analyze the entire packet before
forwarding it to its destination. It takes more time to examine the entire packet, but it
allows catching certain packet errors and keeping them from propagating through the
network.
• Routers: Router forwards packets from one LAN (or WAN) network to another. It is
also used at the edges of the networks to connect to the Internet.
• Gateway: Gateway acts as an entrance between two different networks. Gateway in
organizations is the computer that routes the traffic from a work station to the outside
network that is serving web pages. ISP (Internet Service Provider) is the gateway for
Internet service at home.
Data Transfer Modes:
There are mainly three modes of data transfer.
• Simplex: Data transfer only in one direction e.g., radio broadcasting.
• Half Duplex: Data transfer in both directions, but not simultaneously e.g., talkback
radio.
• Full Duplex or Duplex: Data transfer in both directions, simultaneously e.g., telephone
Data representation :
Information comes in different forms such as text, numbers, images, audio, and video.
• Text: Text is represented as a bit pattern. The number of bits in a pattern depends on
the number of symbols in the language.
• ASCII: The American National Standards Institute developed a code called the
American Standard Code for Information Interchange. This code uses 7 bits for each
symbol.
• Extended ASCII: To make the size of each pattern 1 byte (8 bits), the ASCII bit
patterns are augmented with an extra 0 at the left.
• Unicode: To represent symbols belonging to languages other than English, a code with
much greater capacity is needed. Unicode uses 16 bits and can represent up to 65,536
symbols.
• ISO: The international organization for standardization known as ISO has designed
code using a 32-bit pattern. This code can represent up to 4,294,967,296 symbols.
• Numbers: Numbers are also represented by using bit patterns. ASCII is not used to
represent numbers. The number is directly converted to a binary number.
• Images: Images are also represented by bit patterns. An image is divided into a matrix
of pixels, where each pixel is a small dot. Each pixel is assigned a bit pattern. The size
and value of the pattern depend on the image. The size of the pixel depends on what is
called the resolution.
• Audio: Audio is a representation of sound. Audio is by nature different from text,
numbers or images. It is continuous, not discrete
6
www.byjusexamprep.com
• Physical Layer: The physical layer coordinates the functions required to transmit a
bitstream over a physical medium. It deals with the mechanical and electrical
specifications of interface and transmission medium. It also defines the procedures and
functions that physical devices and interfaces have to perform for transmission to occur.
• Data Link Layer: The data link layer transforms the physical layer, a raw transmission
facility, to a reliable link and is responsible for Node-to-Node delivery. It makes the
physical layer appear error-free to the upper layer (i.e, network layer).
• Network Layer: The network layer is responsible for source to destination delivery of
a packet possibly across multiple networks (links). If the two systems are connected to
the same link, there is usually no need for a network layer. However, if the two systems
are attached to different networks (links) with connecting devices between networks,
there is often a need for the network layer to accomplish source to destination delivery.
• Transport Layer: The transport layer is responsible for- source to destination (end-to-
end) delivery of the entire message. The network layer does not recognize any
relationship between the packets delivered. The network layer treats each packet
independently, as though each packet belonging to a separate message, whether or not
it does. The transport layer ensures that the whole message arrives intact and in order.
7
www.byjusexamprep.com
• Session Layer: The session layer is the network dialog controller. It establishes,
maintains and synchronizes the interaction between communicating systems. It also
plays an important role in keeping application data separate.
• Presentation Layer: This layer is responsible for how an application formats data to
be sent out onto the network. This layer basically allows an application to read (or
understand) the message.
Ethernet
It is basically a LAN technology that strikes a good balance between speed, cost, and ease of
installation.
• Ethernet topologies are general bus and/or bus-star topologies.
• Ethernet networks are passive, which means Ethernet hubs do not reprocess or alter the
signal sent by the attached devices.
• Ethernet technology uses broadcast topology with baseband signaling and a control
method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to
transmit data.
• The IEEE 802.3 standard defines Ethernet protocols for (Open Systems Interconnect)
OSI’s Media Access Control (MAC) sublayer and physical layer network
characteristics.
• The IEEE 802.2 standard defines protocols for the Logical Link Control (LLC)
sublayer.
Ethernet refers to the family of a local area network (LAN) implementations that include
three principal categories.
• Ethernet and IEEE 802.3: LAN specifications that operate at 10 Mbps over coaxial
cable.
• 100-Mbps Ethernet: A single LAN specification, also known as Fast Ethernet, which
operates at 100 Mbps over twisted-pair cable.
• 1000-Mbps Ethernet: A single LAN specification, also known as Gigabit Ethernet,
that operates at 1000 Mbps (1 Gbps) over fiber and twisted-pair cables.
IEEE Standards
• IEEE 802.1: Standards related to network management.
• IEEE 802.2: Standard for the data link layer in the OSI Reference Model
• IEEE 802.3: Standard for the MAC layer for bus networks that use CSMA/CD.
(Ethernet standard)
• IEEE 802.4: Standard for the MAC layer for bus networks that use a token-passing
mechanism (token bus networks).
• IEEE 802.5: Standard for the MAC layer for token-ring networks.
8
www.byjusexamprep.com
FLOW CONTROL:
Flow control coordinates the amount of data that can be sent before receiving ACK It is one of
the most important duties of the data link layer.
ERROR CONTROL:
Error control in the data link layer is based on ARQ (automatic repeat request), which is the
retransmission of data.
• The term error control refers to methods of error detection and retransmission.
• Anytime an error is detected in an exchange, specified frames are retransmitted. This
process is called ARQ.
Error Control (Detection and Correction)
Many factors including line noise can alter or wipe out one or more bits of a given data unit.
• Reliable systems must have the mechanism for detecting and correcting such errors.
• Error detection and correction are implemented either at the data link layer or the
transport layer of the OSI model.
9
www.byjusexamprep.com
Error Detection
Error detection uses the concept of redundancy, which means adding extra bits for detecting
errors at the destination.
Note: Checking function performs the action that the received bitstream passes the checking
criteria, the data portion of the data unit is accepted else rejected.
Vertical Redundancy Check (VRC)
In this technique, a redundant bit, called parity bit, is appended to every data unit, so that the
total number of 1's in the unit (including the parity bit) becomes even. If a number of 1's is
already even in data, then parity bit will be 0.
Some systems may use odd parity checking, where the number of 1's should be odd. The
principle is the same, the calculation is different.
10
www.byjusexamprep.com
Checksum
There are two algorithms involved in this process, checksum generator at sender end and
checksum checker at the receiver end.
The sender follows these steps:
• The data unit is divided into k sections each of n bits.
• All sections are added together using 1's complement to get the sum.
• The sum is complemented and becomes the checksum.
• The checksum is sent with the data.
The receiver follows these steps:
• The received unit is divided into k sections each of n bits.
• All sections are added together using 1's complement to get the sum.
• The sum is complemented.
• If the result is zero, the data are accepted, otherwise, they are rejected.
Cyclic Redundancy Check (CRC):
CRC is based on binary division. A sequence of redundant bits called CRC or the CRC
remainder is appended to the end of a data unit so that the resulting data unit becomes exactly
divisible by a second, predetermined binary number. At its destination, the incoming data unit
is divided by the same number. If at this step there is no remainder, the data unit is assumed to
be intact and therefore is accepted.
Error Correction:
Error correction in the data link layer is implemented simply anytime, an error is detected in
an exchange, a negative acknowledgment NAK is returned and the specified frames are
retransmitted. This process is called an Automatic Repeat Request (ARQ). Retransmission of
data happens in three Cases: Damaged frame, Lost frame and Lost the acknowledgment.
Stop and Wait for ARQ: Include retransmission of data in case of lost or damaged framer.
For retransmission to work, four features are added to the basic flow control mechanism.
• If an error is discovered in a data frame, indicating that it has been corrupted in transit,
a NAK frame is returned. NAK frames, which are numbered, tell the sender to
retransmit the last frame sent.
11
www.byjusexamprep.com
Stop and Wait: In this method, the sender waits for an acknowledgment after every frame it
sends. Only when an acknowledgment has been received is the next frame sent. This process
continues until the sender transmits an End of Transmission (EOT) frame.
• We can have two ways to manage data transmission when a fast sender wants to
transmit data to a low-speed receiver.
12
www.byjusexamprep.com
• The receiver sends information back to the sender giving it permission to send more
data i.e., feedback or acknowledgment based flow control.
• Limit the rate at which senders may transmit data without using feedback from the
receiver i.e., Rate based-flow control.
Advantages of Stop and Wait: It's simple and each frame is checked and acknowledged well.
Disadvantages of Stop and Wait:
• It is inefficient if the distance between devices is long.
• The time spent waiting for ACKs between each frame can add a significant amount to
the total transmission time.
Sliding Window: In this method, the sender can transmit several frames before needing an
acknowledgment. The sliding window refers to imaginary boxes at both the sender and the
receiver. This window can hold frames at either end and provides the upper limit on the number
of frames that can be transmitted before requiring an acknowledgment.
• The frames in the window are numbered modulo-n, which means they are numbered
from 0 to n -1. For example, if n = 8, the frames are numbered 0, 1, 2, 3, 4, 5, 6, 7, 0, 1,
2, 3, 4, 5, 6, 7, 0, 1...so on. The size of the window is (n -1) in this case size of window
= 7..
• In other words, the window can't cover the whole module (8 frames) it covers one
frameless that is 7.
• When the receiver sends an ACK, it includes the number of the next frame it expects to
receive. When the receiver sends an ACK containing the number 5, it means all frames
up to number 4 have been received.
Switching
We have multiple devices we have a problem of how to connect them to make one-to-one
communication possible. Two solutions could be like as given below
• Install a point-to-point connection between each pair of devices (Impractical and
wasteful approach when applied to a very large network).
• For a large network, we can go for switching. A switched network consists of a series
of interlinked nodes, called switches.
13
www.byjusexamprep.com
Classification of Switching
• Circuit Switching: It creates a direct physical connection between two devices such as
phones or computers.
• Space Division Switching: Separates the path in the circuit from each other spatially.
• Time Division Switching: Uses time-division multiplexing to achieve switching.
Circuit switching was designed for voice communication. In a telephone conversation
e.g., Once a circuit is established, it remains connected for the duration of the session.
Disadvantages of Circuit Switching
• Less suited to data and other non-voice transmissions.
• A circuit-switched link creates the equivalent of a single cable between two devices and
thereby assumes a single data rate for both devices. This assumption limits the
flexibility and usefulness of a circuit-switched connection.
• Once a circuit has been established, that circuit is the path taken by all parts of the
transmission, whether or not it remains the most efficient or available.
• Circuit switching sees all transmissions as equal. Any request is granted to whatever
link is available. But often with data transmission, we want to be able to prioritize.
Packet Switching
To overcome the disadvantages of the circuit switch. The packet switching concept came into
the picture.
In a packet-switched network, data are transmitted in discrete units of potentially variable-
length blocks called packets. Each packet contains not only data but also a header with control
information (such as priority codes and source and destination address). The packets are sent
over the network node to the node. At each node, the packet is stored briefly, then routed
according to the information in its header.
There are two popular approaches to packet switching.
1. Datagram
2. Virtual circuit
Datagram Approach: Each packet is treated independently from all others. Even when one
packet represents just a piece of a multi-packet transmission, the network (and network layer
functions) treats it as though it existed alone.
Virtual Circuit Approach: The relationship between all packets belonging to a message or
session is preserved. A single route is chosen between the sender and receiver at the beginning
of the session. When the data are sent, all packets of the transmission travel one after another
along that route.
We can implement it into two formats:
• Switched Virtual Circuit (SVC)
• Permanent Virtual Circuit (PVC)
SVC (Switched Virtual Circuit)
This SVC format is comparable conceptually to dial-up lines in circuit switching. In this
method, a virtual circuit is created whenever it is needed and exists only for the duration of the
specific exchange.
14
www.byjusexamprep.com
15
www.byjusexamprep.com
16
www.byjusexamprep.com
17
www.byjusexamprep.com
Masking
Masking is process that extracts the address of the physical network form an IP address.
Masking can be done whether we have subnetting or not. If we have not subnetted the network,
masking extracts the network address form an IP address. If we have subnetted, masking
extracts the subnetwork address form an IP address.
Masks without Subnetting: To be compatible, routers use mask even, if there is no subnetting.
Masks with Subnetting: When there is subnetting, the masks can vary
Types of Masking
There are two types of masking as given below
Boundary Level Masking :
If the masking is at the boundary level (the mask numbers are either 255 or 0), finding the
subnetwork address is very easy. Follow these 2 rules
• The bytes in IP address that corresponds to 255 in the mask will be repeated in the
subnetwork address.
• The bytes in IP address that corresponds to 0 in the mask will change to 0 in the
subnetwork address.
18
www.byjusexamprep.com
•
As we can see, 3 bytes are ease {, to determine. However, the 4th bytes needs the bit-wise AND
operation.
Router :
A router is a hardware component used to interconnect networks. Routers are devices whose
primary purpose is to connect two or more networks and to filter network signals so that only
desired information travels between them. Routers are much more powerful than bridges.
• A router has interfaces on multiple networks
• Networks can use different technologies
• The router forwards packets between networks
• Transforms packets as necessary to meet standards for each network
• Routers are distinguished by the functions they perform:
o Internal routers: Only route packets within one area.
o Area border routers: Connect to areas together
o Backbone routers: Reside only in the backbone area
o AS boundary routers: Routers that connect to a router outside the AS.
Routers can filter traffic so that only authorized personnel can enter restricted areas. They can
permit or deny network communications with a particular Web site. They can recommend the
best route for information to travel. As network traffic changes during the day, routers can
redirect information to take less congested routes.
• Routers operate primarily by examining incoming data for its network routing and
transport information.
• Based on complex, internal tables of network information that it compiles, a router then
determines whether or not it knows how to forward the data packet towards its
destination.
• Routers can be programmed to prevent information from being sent to or received from
certain networks or computers based on all or part of their network routing addresses.
• Routers also determine some possible routes to the destination network and then choose
the one that promises to be the fastest.
19
www.byjusexamprep.com
20
www.byjusexamprep.com
• Packet-screening firewalls examine incoming and outgoing packets for their network
address information. You can use packet-screening firewalls to restrict access to
specific Websites or to permit access to your network only from specific Internet sites.
• Proxy servers (also called application-level gateways) operate by examining incoming
or outgoing packets not only for their source or destination addresses but also for
information carried within the data area (as opposed to the address area) of each
network packet. The data area contains information written by the application program
that created the packet—for example, your Web browser, FTP, or TELNET program.
Because the proxy server knows how to examine this application-specific portion of the
packet, you can permit or restrict the behavior of individual programs.
• Stateful inspection proxies monitor network signals to ensure that they are part of a
legitimate ongoing conversation (rather than malicious insertions)
Transport Layer Protocols: There are two transport layer protocols as given below.
UDP (User Datagram Protocol)
UDP is a connectionless protocol. UDP provides a way for application to send encapsulate IP
datagram and send them without having to establish a connection.
• Datagram oriented
• unreliable, connectionless
• simple
• unicast and multicast
• Useful only for few applications, e.g., multimedia applications
• Used a lot for services: Network management (SNMP), routing (RIP), naming (DNS),
etc.
UDP transmitted segments consisting of an 8 byte header followed by the payload. The two
parts serve to identify the endpoints within the source and destination machine. When UDP
packets arrives, its payload is handed to the process attached to the destination ports.
• Source Port Address (16 Bits)
The total length of the User Datagram (16 Bits)
• Destination Port Address (16 Bits)
Checksum (used for error detection) (16 Bits
TCP (Transmission Control Protocol)
TCP provides full transport layer services to applications. TCP is a reliable stream transport
port-to-port protocol. The term stream in this context means connection-oriented, a connection
must be established between both ends of transmission before either may transmit data. By
creating this connection, TCP generates a virtual circuit between the sender and receiver that
is active for the duration of the transmission.
TCP is a reliable, point-to-point, connection-oriented, full-duplex protocol.
21
www.byjusexamprep.com
Flag bits
• URG: Urgent pointer is valid If the bit is set, the following bytes contain an urgent
message in the sequence number range “SeqNo <= urgent message <= SeqNo + urgent
pointer”
• ACK: Segment carries a valid acknowledgement
• PSH: PUSH Flag, Notification from sender to the receiver that the receiver should pass
all data that it has to the application. Normally set by sender when the sender’s buffer
is empty
• RST: Reset the connection, The flag causes the receiver to reset the connection.
Receiver of a RST terminates the connection and indicates higher layer application
about the reset
• SYN: Synchronize sequence numbers, Sent in the first packet when initiating a
connection
• FIN: Sender is finished with sending. Used for closing a connection, and both sides of
a connection must send a FIN.
TCP segment format
Each machine supporting TCP has a TCP transport entity either a library procedure, a user
process or port of kernel. In all cases, it manages TCP streams and interfaces to the IP layer. A
TCP entities accepts the user data stream from local processes, breaks them up into pieces not
exceeding 64 K bytes and sends each piece as separate IP datagrams.
Sockets
A socket is one end of an inter-process communication channel. The two processes each
establish their own socket. The system calls for establishing a connection are somewhat
different for the client and the server, but both involve the basic construct of a socket.
The steps involved in establishing a socket on the client side are as follows:
1. Create a socket with the socket() system call
2. Connect the socket to the address of the server using the connect() system call
3. Send and receive data. There are a number of ways to do this, but the simplest is to use
the read() and write() system calls.
22
www.byjusexamprep.com
The steps involved in establishing a socket on the server side are as follows:
1. Create a socket with the socket() system call
2. Bind the socket to an address using the bind() system call. For a server socket on the
Internet, an address consists of a port number on the host machine.
3. Listen for connections with the listen() system call
4. Accept a connection with the accept() system call. This call typically blocks until a
client connects with the server.
5. Send and receive data
When a socket is created, the program has to specify the address domain and the socket type.
Socket Types
There are two widely used socket types, stream sockets, and datagram sockets.
Stream sockets treat communications as a continuous stream of characters, while datagram
sockets have to read entire messages at once. Each uses its own communications protocol.
Stream sockets use TCP (Transmission Control Protocol), which is a reliable, stream oriented
protocol, and datagram sockets use UDP (Unix Datagram Protocol), which is unreliable and
message oriented. A second type of connection is a datagram socket. You might want to use a
datagram socket in cases where there is only one message being sent from the client to the
server, and only one message being sent back. There are several differences between a
datagram socket and a stream socket.
1. Datagrams are unreliable, which means that if a packet of information gets lost
somewhere in the Internet, the sender is not told (and of course the receiver does not
know about the existence of the message). In contrast, with a stream socket, the
underlying TCP protocol will detect that a message was lost because it was not
acknowledged, and it will be retransmitted without the process at either end knowing
about this.
2. Message boundaries are preserved in datagram sockets. If the sender sends a datagram
of 100 bytes, the receiver must read all 100 bytes at once. This can be contrasted with
a stream socket, where if the sender wrote a 100 byte message, the receiver could read
it in two chunks of 50 bytes or 100 chunks of one byte.
3. The communication is done using special system calls sendto() and receivefrom() rather
than the more generic read() and write().
4. There is a lot less overhead associated with a datagram socket because connections do
not need to be established and broken down, and packets do not need to be
acknowledged. This is why datagram sockets are often used when the service to be
provided is short, such as a time-of-day service.
Application Layer Protocols (DNS, SMTP, POP, FTP, HTTP)
There are various application layer protocols as given below
• SMTP (Simple Mail Transfer Protocol): One of the most popular network service is
electronic mail (e-mail). The TCP/IP protocol that supports electronic mail on the
Internet is called Simple Mail Transfer Protocol (SMTP). SMTP is system for sending
23
www.byjusexamprep.com
messages to other computer. Users based on e-mail addresses. SMTP provides services
for mail exchange between users on the same or different computers.
• TELNET (Terminal Network): TELNET is client-server application that allows a
user to log onto remote machine and lets the user to access any application program on
a remote computer. TELNET uses the NVT (Network Virtual Terminal) system to
encode characters on the local system. On the server (remote) machine, NVT decodes
the characters to a form acceptable to the remote machine.
• FTP (File Transfer Protocol): FTP is the standard mechanism provided by TCP/IP
for copying a file from one host to another. FTP differs form other client-server
applications because it establishes 2 connections between hosts. One connection is used
for data transfer, the other for control information (commands and responses).
• Multipurpose Internet Mail Extensions (MIME): It is an extension of SMTP that
allows the transfer of multimedia messages.
• POP (Post Office Protocol): This is a protocol used by a mail server in conjunction
with SMTP to receive and holds mail for hosts.
• HTTP (Hypertext Transfer Protocol): This is a protocol used mainly to access data
on the World Wide Web (www), a respository of information spread all over the world
and linked together. The HTIP protocol transfer data in the form of plain text, hyper
text, audio, video and so on.
• Domain Name System (DNS): To identify an entity, TCP/IP protocol uses the IP
address which uniquely identifies the connection of a host to the Internet. However,
people refer to use names instead of address. Therefore, we need a system that can map
a name to an address and conversely an address to name. In TCP/IP, this is the domain
name system.
DNS in the Internet
DNS is protocol that can be used in different platforms. Domain name space is divided into
three categories.
• Generic Domain: The generic domain defines registered hosts according, to their
generic behaviour. Each node in the tree defines a domain which is an index to the
domain name space database.
24
www.byjusexamprep.com
• Country Domain: The country domain section follows the same format as the generic
domain but uses 2 characters country abbreviations (e.g., US for United States) in place
of 3 characters.
• Inverse Domain: The inverse domain is used to map an address to a name.
Overview of Services
Network Security : As millions of ordinary citizens are using networks for banking, shopping,
and filing their tax returns, network security is looming on the horizon as a potentially massive
problem.
Network security problems can be divided roughly into four intertwined areas:
1. Secrecy: keep information out of the hands of unauthorized users.
2. Authentication: deal with determining whom you are talking to before revealing
sensitive information or entering into a business deal.
3. Nonrepudiation: deal with signatures.
4. Integrity control: how can you be sure that a message you received was really the one
sent and not something that a malicious adversary modified in transit or concocted?
There is no one single place -- every layer has something to contribute :
• In the physical layer, wiretapping can be foiled by enclosing transmission lines in sealed
tubes containing argon gas at high pressure. Any attempt to drill into a tube will release
some gas, reducing the pressure and triggering an alarm (used in some military
systems).
• In the data link layer, packets on a point-to-point line can be encoded.
• In the network layer, firewalls can be installed to keep packets in/out.
• In the transport layer, entire connection can be encrypted.
25
www.byjusexamprep.com
26
www.byjusexamprep.com
Advantage of Secret key Algorithm: Secret Key algorithms are efficient: it takes less time to
encrypt a message. The reason is that the key is usually smaller. So it is used to encrypt or
decrypt long messages.
Disadvantages of Secret key Algorithm: Each pair of users must have a secret key. If N
people in world want to use this method, there needs to be N (N-1)/2 secret keys. For one
million people to communicate, a half-billion secret keys are needed. The distribution of the
keys between two parties can be difficult.
Asymmetric / Public Key Cryptography
A public key cryptography refers to a cyptogaphic system requiring two separate keys, one of
which is secrete/private and one of which is public although different, the two pats of the key
pair are mathematically linked.
• Public Key: A public key, which may be known by anybody and can be used to encrypt
messages and verify signatures.
• Private Key: A private key, known only to the recipient, used to decrypt messages and
sign (create) signatures. It is symmetric because those who encrypt messages or verify
signature cannot decrypt messages or create signatures. It is computationally infeasible
to find decryption key knowing only algorithm and encryption key. Either of the two
related keys can be used for encryption, with the other used for decryption (in some
schemes).
27
www.byjusexamprep.com
28
www.byjusexamprep.com
• Depends on 4 functions: Expansion E, XOR with round key, S-box substitution, and
Permutation.
• DES results in a permutation among the 264 possible arrangements of 64 bits, each of
which may be either 0 or 1. Each block of 64 bits is divided into two blocks of 32 bits
each, a left half block L and a right half R. (This division is only used in certain
operations.)
DES is a block cypher: meaning it operates on plaintext blocks of a given size (64-bits) and
returns cipher text blocks of the same size. Thus DES results in a permutation among the 264
possible arrangements of 64 bits, each of which may be either 0 or 1. Each block of 64 bits is
divided into two blocks of 32 bits each, a left half block L and a right half R. (This division is
only used in certain operations.)
Authentication Protocols
Authentication: It is the technique by which a process verifies that its communication partner
is who it is supposed to be and not an imposter. Verifying the identity of a remote process in
the face of a malicious, active intruder is surprisingly difficult and requires complex protocols
based on cryptography.
The general model that all authentication protocols use is the following:
• An initiating user A (for Alice) wants to establish a secure connection with a second
user B (for Bob). Both and are sometimes called principals.
• Starts out by sending a message either to, or to a trusted key distribution center
(KDC), which is always honest. Several other message exchanges follow in various
directions.
• As these message are being sent, a nasty intruder, T (for Trudy), may intercept, modify,
or replay them in order to trick and When the protocol has been completed, is sure she
is talking to and is sure he is talking to. Furthermore, in most cases, the two of them
will also have established a secret session key for use in the upcoming conversation.
In practice, for performance reasons, all data traffic is encrypted using secret-key cryptography,
although public-key cryptography is widely used for the authentication protocols themselves
and for establishing the (secret) session key.
Authentication based on a shared Secret key
Assumption: and share a secret key, agreed upon in person or by phone.
This protocol is based on a principle found in many (challenge-response) authentication
protocols: one party sends a random number to the other, who then transforms it in a special
way and then returns the result.
Three general rules that often help are as follows:
1. Have the initiator prove who she is before the responder has to.
2. Have the initiator and responder use different keys for proof, even if this means having
two shared keys, and.
3. Have the initiator and responder draw their challenges from different sets.
29
www.byjusexamprep.com
30