DATA COMMUNICATION Summary
DATA COMMUNICATION Summary
1
11.
12. The Physical Layer is the lowest layer in the OSI (Open Systems Interconnection)
model. Its primary function is to define the hardware elements and physical
medium used for communication
Data Encoding and Signaling: The Physical Layer is responsible for encoding
the binary data into electrical, optical, or radio wave signals for transmission
over the physical medium.
Data Transmission Rate (Bit Rate): The Physical Layer defines the transmission
rate at which bits are sent over the network. This is often referred to as the bit
rate or data rate and is measured in bits per second (bps).
Synchronization of Bits: Ensures that the sender and receiver are synchronized
in terms of when bits are transmitted and when they are received.
2
Bit Order: Determines the order in which bits are transmitted over the medium,
whether it is transmitted least significant bit (LSB) first or most significant bit
(MSB) first.
Error Detection and Correction: In some cases, the Physical Layer may include
mechanisms for detecting and correcting errors that can occur during data
transmission
Topology Changes: The Physical Layer deals with the physical connection and
disconnection of devices on the network, managing changes in the network
topology.
13. The Data Link Layer essentially acts as a bridge between the Physical Layer and
the Network Layer, providing a reliable link for the transmission of data between
directly connected nodes in a network. Popular protocols operating at this layer
include Ethernet, Wi-Fi, and PPP (Point-to-Point Protocol).
Flow Control: Manages the flow of data between devices to prevent congestion
and ensure efficient communication.
3
Error Handling: Detects errors and takes appropriate action, such as requesting
the retransmission of frames that were not received correctly.
14. The Network Layer, which is the third layer in the OSI model, provides logical
addressing, routing, and forwarding of data between devices across different
networks. Here are the key functions of the Network Layer:
Routing: Determines the best path for data to travel from the source to the
destination across multiple interconnected networks. Routing is based on logical
addresses.
Path Determination: Selects the most efficient route for data transmission,
considering factors like network topology, traffic load, and available resources.
Packet Forwarding: Forwards data packets from the source to the destination
through intermediate routers based on the destination address.
Subnetting: Divides large networks into smaller subnets, allowing for better
organization, management, and routing efficiency.
4
15. The Transport Layer is the fourth layer in the OSI model and is responsible for
ensuring reliable end-to-end communication and data transfer between devices
on different hosts. Here are the key functions of the Transport Layer:
Segmentation and Reassembly: Divides data from the upper layers into smaller
segments for efficient transmission. At the receiving end, these segments are
reassembled into the original data.
Flow Control: Manages the rate at which data is sent between devices to
prevent overwhelming the receiver. Flow control mechanisms prevent
congestion and ensure that the sender does not flood the receiver with more
data than it can handle.
5
Congestion Control: Monitors and manages network congestion to ensure
optimal performance and prevent degradation of service.
16. The Session Layer is the fifth layer in the OSI model, and its primary function is to
establish, manage, and terminate communication sessions between two
devices. A communication session can be thought of as a dialog between two
processes, applications, or systems.
Token Management: Manages the use of tokens, which control access to the
communication channel. A token is a unique identifier that allows a device or
application to control the right to send data.
6
Data Flow Control: Regulates the flow of data between devices to prevent
overwhelming the receiver and ensure that communication occurs at a pace that
both devices can handle.
17. The Presentation Layer is the sixth layer in the OSI model, and its primary
function is to translate data between the Application Layer and the lower layers
of the OSI model, ensuring that data is presented in a readable and usable
format
Data Translation: Converts data from the format used by the application layer
into a common format that can be understood by both the sender and receiver.
This involves character set translation, data encoding, and format conversion.
Data Syntax Control: Manages the syntax of data, ensuring that the structure
and format are compatible between the communicating devices.
Data Formatting and Parsing: Prepares data for presentation to the application
layer by formatting it according to the specified syntax. This includes parsing
received data to extract the relevant information.
7
Protocol Conversion: Converts data between different communication
protocols to facilitate communication between systems that may use different
standards.
18. The Application Layer is the topmost layer in the OSI model, and it represents the
interface between the network and the software applications that communicate
over the network. This layer provides network services directly to end-users or
application processes.
Remote Login: Allows users to log into remote systems and execute commands.
Protocols like Telnet operate at this layer.
Web Browsing Enables users to access and interact with websites using
protocols like HTTP (Hypertext Transfer Protocol).
8
Presentation of Data: Translates and presents data in a format that is
understandable to the user or application. This includes tasks such as data
formatting, encryption, and compression.
19. The hardware address, also known as the Media Access Control (MAC) address,
is a unique identifier assigned to each network interface card (NIC) in a device.
MAC addresses are typically represented as a series of six pairs of hexadecimal
digits separated by colons or hyphens (e.g., 00:1A:2B:3C:4D:5E).
20. MAC addresses operate at the Data Link Layer (Layer 2) of the OSI model and are
used for local network communication within the same physical network
segment.
21. Port addresses are used in the context of transport layer protocols (such as TCP
and UDP) to distinguish between different services or applications on a single
device.
22. Port addresses are 16-bit numbers, and they are used in combination with IP
addresses to uniquely identify a specific process or service on a device.
23. Port addresses operate at the Transport Layer (Layer 4) of the OSI model and are
used to direct data to the correct application or service running on a device.
26. Logical addressing operates at the Network Layer (Layer 3) of the OSI model and
is used for global communication between devices on different networks.
29. Layer 1 , Layer 2 and Layer 3 in OSI model are network layers
30. Layer 5 , Layer 6 and Layer 7 in OSI model are User layers
31.
10
32. The TCP/IP model, also known as the Internet protocol suite, is a conceptual framework
used for understanding and designing network protocols.
34. The TCP/IP model is a set of protocols and standards that form the foundation of the
modern internet. It consists of four layers, Link layer or Network access layer , Internet
layer , Transport layer and application layer .
35. Link Layer (or Network Access Layer): This layer deals with the physical connection to
the network and the transmission of raw bits over a physical medium. It includes
protocols for Ethernet, Wi-Fi, and other technologies. Network interface cards,
switches, and bridges operate at this layer.
36. Internet LayerThis layer is responsible for logical addressing, routing, and
fragmentation and reassembly of packets. The Internet Protocol (IP) operates at this
layer. Routers operate at the Internet Layer.
37. Transport Layer: his layer is concerned with end-to-end communication, ensuring that
data is reliably and accurately delivered between devices. It includes protocols like
Transmission Control Protocol (TCP) for reliable, connection-oriented communication,
and User Datagram Protocol (UDP) for connectionless, lightweight communication.
Gateways and hosts operate at the Transport Layer.
38. Application Layer: This layer deals with high-level protocols, including those for email,
file transfer, and web browsing. It provides a platform for software applications to
communicate over a network. HTTP (Hypertext Transfer Protocol), FTP (File Transfer
Protocol), SMTP (Simple Mail Transfer Protocol), and others operate at the Application
Layer.
39. Common protocols and technologies associated with the Network Access Layer in
TCP/IP include Ethernet, Wi-Fi (802.11), PPP (Point-to-Point Protocol), and others.
40. The LLC ( Logical Link Control ) sublayer is responsible for providing a reliable link
between devices over a network. It deals with flow control, error checking, and
addressing at the Data Link Layer
41. In the TCP/IP model, the most commonly used LLC protocol is the IEEE 802.2 standard,
which defines the LLC sublayer for various network technologies.
42. LSAP (Logical Service Access Point) is a concept associated with the LLC sublayer. It is a
value used to identify the type of network layer protocol being used. LSAP values are
used in IEEE 802.2 frames to indicate the upper-layer protocol for which the frame is
intended.
11
43. LSAP values are 8 bits long and can vary for different protocols. For example, an LSAP
value of 0xAA might be used to identify IP (Internet Protocol) as the upper-layer protocol.
44. LSAP values help the receiving device at the Data Link Layer determine which higher-
layer protocol should process the data contained in the frame.
45. Ethernet typically uses various types of cabling, such as twisted pair cables (like Cat5e
or Cat6) or fiber-optic cables, to transmit data.
46. Ethernet operates at the Data Link Layer of the OSI model. The most common Ethernet
protocol is IEEE 802.3.
47. Ethernet frames consist of a header, payload (data), and a trailer. The header includes
source and destination MAC addresses, among other control information.
48. Devices on an Ethernet network are identified by their unique Media Access Control
(MAC) addresses.
49. Ethernet uses the CSMA/CD access method, where devices listen to the network before
transmitting to avoid collisions.
50. In CSMA / CD If a collision is detected (two devices transmitting at the same time), a
backoff algorithm is used to prevent both devices from retransmitting simultaneously.
51. Ethernet comes in various speeds, with common standards including 10 Mbps
(Ethernet), 100 Mbps (Fast Ethernet), 1 Gbps (Gigabit Ethernet), 10 Gbps (10 Gigabit
Ethernet), and higher.
52. Ethernets are designated as 10 base T , 10 base 2 , 10 base 5 , 100 base x and
1000 base x etc.
53. ICMP ( Internet control message protocol ) is primarily used for sending error
messages and operational information about network conditions. It provides feedback
about the status of network communication.
54. ICMP includes the Echo Request and Echo Reply messages, commonly used for
network troubleshooting. The "ping" command sends Echo Request messages to a
destination host, and the host responds with Echo Reply messages.
55. IGMP ( Internet Group message Protocol ) is used by hosts to report their multicast
group memberships to any neighboring multicast routers. It enables hosts to join or
leave multicast groups on a network.
12
56. There are multiple versions of IGMP. IGMPv2 and IGMPv3 are commonly used. IGMPv2
adds a Leave Group message to improve group management, while IGMPv3 introduces
source-specific multicast, allowing hosts to express interest in traffic from specific
sources.
58. RARP (Reverse Address Resolution Protocol): RARP is the reverse of ARP. It is used to
map a MAC address to an IP address. RARP is less commonly used than ARP.
60. UDP( User datagram Protocol ) is a connectionless protocol, meaning it does not
establish a dedicated connection before transmitting data. Each packet is independent.
Source Port (16 bits): Identifies the port number of the sender's application.
Destination Port (16 bits): Identifies the port number of the receiver's application.
Sequence Number (32 bits): It is used for ordering and reassembly of segments at the
receiver.
13
Acknowledgment Number (32 bits): If the ACK flag is set, this field contains the next
sequence number that the sender of the segment is expecting to receive. It
acknowledges receipt of all prior bytes (up to the acknowledged number).
Data Offset (4 bits): Specifies the length of the TCP header in 32-bit words. This field
indicates where the data begins. The minimum value for this field is 5, indicating a 20-
byte header.
Control Flags (6 bits): Contains several control flags that control the behavior of the
TCP connection. Common flags include:
URG (Urgent): Indicates that the Urgent Pointer field is significant.
ACK (Acknowledgment): Indicates that the Acknowledgment Number field is significant.
PSH (Push): Pushes data to the receiving application without waiting for a full buffer.
RST (Reset): Resets the connection.
SYN (Synchronize): Initiates a connection.
FIN (Finish): Terminates a connection.
Window Size (16 bits): Specifies the size of the sender's receive window. It indicates
how much data the sender is willing to receive before requiring an acknowledgment.
Checksum (16 bits): Provides error-checking for the TCP header and data. It covers the
entire TCP segment.
Urgent Pointer (16 bits): f the URG flag is set, this 16-bit field is an offset from the
sequence number indicating the last urgent data byte.
Options (variable): May include optional parameters or padding. The length of the
options field is determined by the Data Offset field.
62. DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol used to
automatically assign and manage IP addresses and configuration information to devices
on a network
63. By automating the assignment of IP addresses, DHCP helps in managing and organizing
network configurations more efficiently. It eliminates the need for manual IP address
assignments, reducing the likelihood of conflicts and making it easier to add or remove
devices from the network.
64. DHCP is commonly used in local area networks (LANs), home networks, and in larger
enterprise environments to streamline the network configuration process.
14
65. NTP is a protocol for time synchronization on computer networks, while FTTP is a type of
broadband internet service that uses fiber-optic cables to provide high-speed internet
access.
66. FTP (File Transfer Protocol) and TFTP (Trivial File Transfer Protocol) are both networking
protocols used for transferring files between systems.
67. FTP is a standard network protocol used to transfer files between a client and a server
on a computer network.
68. FTP operates on the traditional client-server model where the client initiates a
connection to the server and can upload or download files.
69. TFTP (Trivial File Transfer Protocol): TFTP is a simpler and less feature-rich file transfer
protocol compared to FTP.
70. TFTP is often used in scenarios where simplicity is more critical than advanced features.
It's commonly used in situations like bootstrapping devices, transferring firmware
images, or configurations within a local network.
71. Telnet has largely been replaced by more secure protocols such as SSH (Secure Shell).
Telnet is a text-based protocol, meaning that the communication is in the form of plain
text. This includes the transmission of commands and responses.
72. Telnet was once widely used for remote access, its lack of encryption and susceptibility
to security threats have led to its decline in favor of more secure alternatives like SSH
73. SNMP (Simple Network Management Protocol) and SMTP (Simple Mail Transfer
Protocol) are two different network protocols serving distinct purposes in the realm of
networking and communication.
74. SNMP is designed to manage and monitor network devices and their functions. It allows
network administrators to monitor the performance, detect and resolve network issues,
and configure remote devices.
75. SMTP is a protocol used for the transmission of email messages between email servers.
It works to send outgoing mail from a client (email sender) to a server or between email
servers.
76. SNMP comprises a set of standards, including the SNMP manager, SNMP agents,
Management Information Base (MIB), and the SNMP protocol itself.
77. SMTP is part of the application layer of the Internet Protocol Suite and works in
conjunction with other protocols like POP3 (Post Office Protocol) and IMAP (Internet
Message Access Protocol) that are used by email clients to retrieve messages.
15
78. Port numbers are 16-bit unsigned integers, and they range from 0 to 65535.
79. Well-Known Ports (0-1023): Reserved for standard services like HTTP (80), HTTPS (443),
FTP (21), SMTP ( 25).
80. Registered Ports (1024-49151): Assigned by the Internet Assigned Numbers Authority
(IANA) for specific applications.
81. In unicast communication, data is sent from one sender to one specific receiver. It is
One-to-one communication or Point-to-point communication.
82. In multicast communication, data is sent from one sender to multiple recipients. It is
One-to-many communication.
83. In broadcast communication, data is sent from one sender to all devices in the network.
It is one to all communication .
84. LANs are networks that are limited to a small geographic area, such as a single building,
a campus, or a group of nearby buildings.
85. MANs cover a larger geographic area than LANs but are smaller than WANs. They
typically span a city or a large campus.
86. WANs cover a wide geographic area and can connect networks across cities, countries,
or even continents.
87. In a bus topology, all devices share a common communication medium, often a single
cable. Nodes are connected to the bus through interfaces or taps.
88. In a star topology, each device is connected to a central hub or switch. All
communication between devices passes through the central hub.
89. In a ring topology, each device is connected to exactly two other devices, forming a
closed loop. Data travels in one direction around the ring.
90. In a mesh topology, every device is connected to every other device in the network.
There are two types: full mesh (every node connects to every other node) and partial
mesh (only some nodes connect to others).
91. A tree topology is a combination of star and bus topologies. It consists of groups of star-
configured networks connected to a linear bus backbone.
92. A repeater operates at the Physical Layer (Layer 1) of the OSI model. Its primary function
is to regenerate and retransmit signals to extend the reach of a network by boosting the
signal strength.
16
93. A hub operates at the Physical Layer (Layer 1) of the OSI model, similar to a repeater. It
connects multiple devices in a local network and regenerates signals, broadcasting
incoming data to all connected devices.
94. Hub is multiport repeater and non intelligent device . There are two types of
hubs namely active hub ( concentrator ) and Passive hub . It works in half
duplex mode.
95. Both bridges and switches operate at the Data Link Layer and use MAC addresses for
forwarding decisions.
96. Bridges connect and filter traffic between network segments, while switches are more
advanced, providing larger MAC address tables and often supporting higher port
densities and speeds.
97. Switches offer separate collision domains for each port, support full-duplex
communication, and handle broadcasts more efficiently than bridges.
99. Router: Primarily operates at Layer 3, makes decisions based on IP addresses, and
connects different networks. Often involved in routing, NAT, and packet filtering.
100.
Gateway: A more general term referring to any device that connects different networks.
Gateways can operate at various layers and may perform protocol translation or other
functions.
101.
Token Ring is a network topology and access method in which a token, a small data
packet, is passed along a physical or logical ring from one node to the next. This token
passing mechanism controls access to the network and helps regulate the flow of data.
102.
Token is a kind of permission slip . Token ring contains 6 bytes address. Speeds
supported by token rings is 4 mbps / 16 mbps. The token ring cable impedence is
150 ohms
103.
Fiber Distributed Data Interface (FDDI) is a high-speed local area network (LAN)
technology that uses optical fiber for data transmission. It was designed to provide a
reliable and high-performance network infrastructure for both data and voice
17
communication. FDDI was standardized by the American National Standards Institute
(ANSI) and the International Organization for Standardization (ISO)
104. FDDI contains dual rings and access method used in FDDI is token passing
. It uses 6 byte addressing . Data rates supported by FDDI is 100 mbps
105.
X.25 provided a standardized framework for wide-area networking and served as a
foundation for early computer networks.
106.
X.25 uses network addresses to identify devices on the network. Each device connected
to an X.25 network is assigned a unique address for communication.
107.
X.25 provides an interface at the Data Link Layer (Layer 2) and Network Layer (Layer 3) of
the OSI model. It specifies both the link layer protocol (LAP, Link Access Procedure) and
the network layer protocol (Packet Layer Protocol).
108.
It uses packet switching . the interface between DTE ( Data Terminal equipment )
and DCE ( data Ciruit terminating equipment ) is X.25
109.
Frame Relay is a high-performance packet-switched networking protocol used to
connect local area networks (LANs) and other network devices over wide-area networks
(WANs).
110.
Frame Relay uses the concept of virtual circuits to establish logical connections
between devices on the network. These virtual circuits are identified by Data Link
Connection Identifiers (DLCIs).
111.
Frame relay contains Permanent or switched virtual networks .
112.
Asynchronous Transfer Mode (ATM) is a high-speed networking standard designed for
the simultaneous transmission of voice, video, and data over a single network. It was
developed to address the need for a flexible and efficient network technology capable of
handling diverse types of traffic. ATM operates at the data link layer (Layer 2) of the OSI
model.
113.
ATM uses a fixed-length cell format for data transmission. Each cell is 53 bytes in size,
consisting of a 5-byte header and a 48-byte payload. The fixed size of cells simplifies the
switching process and enables more predictable and efficient network performance.
18
114.
ATM is connection-oriented, meaning that virtual circuits must be established before
data can be transferred. There are two types of virtual circuits in ATM: Permanent Virtual
Circuits (PVCs) and Switched Virtual Circuits (SVCs).
115.
ATM contains 3 layers namely physical layer data link layer and ATM network layer .
116.
Sublayers in Data link layers
ATM Adaptation Layer (AAL): AAL is a sublayer responsible for adapting higher-layer
protocols (such as IP, voice, or video) to the fixed-size ATM cells. It ensures that different
types of traffic can be transported over ATM networks.
ATM Layer (ATM Layer Management): This sublayer is responsible for managing the
ATM layer, including cell multiplexing and demultiplexing, cell switching, and flow
control.
IP ADDRESSING
4. There are two main versions of the Internet Protocol in common use and they
are IPv4 addressing and IPv6 addressing.
5. IPv4 version uses 32-bit addresses and IPv6 address uses 128 bits.
6. IPv4 addresses were initially divided into five classes, labeled A, B, C, D, and E.
7. In a Class A address, the first bit is always set to 0, indicating that it belongs to
Class A. The next 7 bits (in the first octet) are used for the network identifier, and
the remaining 24 bits are for host addresses.
19
8. Class A addresses have a range from 0.0.0.0 to 127.255.255.255.
9. There are 128 possible Class A networks (ranging from 0.0.0.0 to 127.0.0.0).
However, not all of them are available for general use, as some are reserved or
have special purposes.
10. The actual number of usable Class A networks is less than 128. But 0.0.0.0 is
used for default route and 127.0.0.0 is used for loop back . Hence
available networks in Class A address are 27 - 2 = 126 Networks.
13. Class A addresses are quite rare and are generally assigned to very large
organizations or entities that require a tremendous number of IP addresses for
their networks.
14. In a Class B address, the first two bits of the first octet are always set to 10,
which identifies it as a Class B address. The next 14 bits in the first two octets are
used for the network identifier, and the remaining 16 bits in the last two octets
are available for host addresses.
16. There are 16,384 possible Class B networks (2^14), which makes Class B
addresses suitable for medium-sized organizations or institutions.
18. Class B addresses are commonly used in corporate networks, universities, and
mid-sized organizations.
20. Class C addresses allocate the first 24 bits for the network identifier, leaving the
last 8 bits for host addresses.
21. In a Class C address, the first three bits of the first octet are always set to 110,
which identifies it as a Class C address. The next 21 bits in the first three octets
are used for the network identifier, and the remaining 8 bits in the last octet are
available for host addresses.
20
22. Class C addresses have a range from 192.0.0.0 to 223.255.255.255
23. There are 2,097,152 possible Class C networks (2^21), which makes Class C
addresses suitable for smaller organizations, local area networks (LANs), and
even some internet service providers.
24. Each Class C network can accommodate up to 254 (2^8 - 2) host addresses.
30. Class E addresses were originally reserved for experimental and research
purposes.
31. Classful IP addressing :-It divided the available IP address space into five
classes: A, B, C, D, and E. Each class had a fixed range of IP addresses, and the
class determined the network and host portions of the address.
35. The subnet mask is a 32-bit binary value used to separate the network and host
portions of an IP address.
21
36. It consists of a series of contiguous '1' bits followed by a series of contiguous '0'
bits.
The '1' bits in the subnet mask indicate the network portion, and the '0' bits
indicate the host portion.
37. Common subnet masks include 255.0.0.0 for Class A, 255.255.0.0 for Class B,
and 255.255.255.0 for Class C addresses.
So, here, the first 24 bits (First 3 octets) are network bits and the last 8 bits (Last
octet) are the host bits.
10.128.240.50/30.
IP Address : 10.128.240.50
Sunet Mask : 255.255.255.252
Remember the total Subnet Mask is 32 bits. So in binary mode our Subnet Mask
is:
IP Add : 00001010.10000000.11110000.00110010
SubM : 11111111.11111111.11111111.11111100
AND : 00001010.10000000.11110000.00110000
22
This is 00001010.10000000.11110000.00110000 in binary.
The decimal value of this is 10.128.240.48.
When we set all the host bits with 1s, we will find the Broadcast Address.
This is 00001010.10000000.11110000.00110011 in binary.
The decimal value is 10.128.240.51.
Last Address
23
42. Two – Level Internet Address Stucture
24
48. Supernetting, also known as route aggregation, is an IP addressing technique
that involves combining multiple smaller address blocks or subnets into a
single, larger network.
49. This process results in the creation of a supernet, which simplifies routing and
reduces the size of routing tables, making network management more
efficient.
51. Supernetting is the idea of combining two or more blocks of IP address that
together compose a continuous range of addresses.
192.60.128.0 11000000.00111100.10000000.00000000
192.60.129.0 11000000.00111100.10000001.00000000
192.60.130.0 11000000.00111100.10000010.00000000
192.60.131.0 11000000.00111100.10000011.00000000
Supernet Address is 192.60.128.0 /22
Subnet Mask 11111111.11111111.11111100.00000000
255 . 255 . 252 . 0
25
54. Each 16-bit block is converted to hexadecimal and delimited with colons:
21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A
56. Example:
– FE80:0:0:0:2AA:FF:FE9A:4CA2 becomes FE80::2AA:FF:FE9A:4CA2
– FF02:0:0:0:0:0:0:2 becomes FF02::2
57. Types of IPv6 Address are Unicast address , Multicast addresses and
Anycast addresses.
26
– IPv6 router never forwards the link-local traffic beyond the link
66. In IPV4 source and destination addresses are 4 bytes and in IPV6 it is 16
bytes
67. IPsec, or Internet Protocol Security, is a set of protocols and standards used to
secure Internet Protocol (IP) communications and data traffic.
68. Two modes in IPsec ate Transport mode and Tunnel Mode
In this mode, only the payload (the actual data being transmitted) is encrypted
and authenticated while the header information of the IP packet remains
intact.
This mode is often used for end-to-end communication.
27
This mode is often used to create secure connections between network
gateways, such as when setting up VPNs.
72. In IPv6 ARP requests are replaced with Multicast Neighbour Solicitation
messages
74. In IPV6 ICMP router discovery is replaced with ICMPv6 router Solicitation .
75. There are no IPv6 broadcast addresses instead a link- local scope all nodes
multicast address is used .
76. IP4 Supports a 576 byte packet size where as IPv6 supports 1280 packet
size.
2. Routing involves making decisions about how to forward data packets based on
the network topology, available paths, and various routing algorithms.
3. Routing algorithms consider factors like network topology, link costs, traffic
load, and quality of service requirements to determine the best path for data to
take.
4. Routers in the network maintain routing tables, which contain information about
known destinations and the corresponding next hop or outgoing interface to
reach those destinations.
28
5. In static routing, administrators manually configure the routing tables on routers.
Static routes do not change unless explicitly modified by an administrator,
making them less adaptable to network changes.
7. Protocols like OSPF (Open Shortest Path First) and BGP (Border Gateway
Protocol) are commonly used for dynamic routing.
10. QoS requirements, ensuring that data packets with different priorities (e.g.,
voice, video, data) are routed accordingly to meet specific service level
agreements.
11. Routing tables are data structures used by routers in computer networks to
determine how to forward data packets.
12. In an IPv4 routing table, entries typically include the following information:
The first entry specifies that any packet destined for the 192.168.1.0/24 subnet
should be sent to the next hop 192.168.1.1 via the LAN interface.
The second entry indicates that packets destined for the 10.0.0.0/8 network
should be sent to the next hop 10.0.0.1 via the WAN interface.
The third entry (default route, 0.0.0.0/0) is used for all other destinations and
sends packets to the next hop 203.0.113.1, which is the gateway to the Internet.
29
13. IPv6 Routing Table Example:
In an IPv6 routing table, entries follow a similar structure to IPv4 but deal with
IPv6 addresses and prefixes:
The first entry routes packets for the 2001:db8:0:abc::/64 subnet to the next hop
2001:db8:0:abc::1 via the LAN interface.
The second entry routes packets for the 2001:db8:100:1::/48 network to the next
hop 2001:db8:100:1::2 via the WAN interface.
The third entry (::/0) is the default route for all other destinations and sends
packets to the next hop 2001:db8:0:1::1, which is the gateway to the Internet.
14. Dijkstra's Algorithm: This algorithm finds the shortest path between two nodes
in a weighted graph. It's used in link-state routing protocols like OSPF.
15. IGRP is another distance vector routing algorithm developed by Cisco for its
routers.
16. OSPF is a link-state routing protocol that calculates the shortest path to a
destination based on link costs. It is commonly used in large IP networks.
18. BGP is an exterior gateway protocol used to route traffic between different
autonomous systems on the internet. It makes routing decisions based on
multiple criteria, including policies and path attributes.
30
20. IANA ( Internet Assigned numbers Authority ) assigns unique AS number to
ISP.
22. Static routing involves manually configuring routing tables on routers. Network
administrators specify the routes and next hops for each destination in the
routing table.
23. Static routes remain constant unless modified by an administrator. They do not
adapt to changes in the network, such as link failures or congestion
24. Static routing is straightforward to set up and is efficient for small networks with
simple topologies where network changes are infrequent
26. In some cases, static routing can enhance network security by minimizing the
potential for unauthorized route changes
27. Static Routing is not suitable for large, complex networks with changing
topologies because it lacks adaptability. Manual configuration can be error-
prone and time-consuming.
29. Dynamic routing protocols can respond to network changes, such as link failures
or network additions, by recalculating routes based on the most current
information
30. Dynamic routing is well-suited for large and complex networks where the
topology can change frequently. It scales better than static routing.
31. It can optimize routes based on factors like link bandwidth, delay, and traffic
load, leading to more efficient use of network resources
32. Examples of dynamic routing protocols include OSPF, EIGRP, RIP, and BGP, each
with its own strengths and use cases.
31
33. RIP is a distance vector routing protocol, which means it determines the best
path to a destination based on the number of hops (routers) that must be
traversed. It periodically broadcasts routing tables to its neighboring routers
34. RIP uses hop count as the metric to measure the distance to a destination. A
route with fewer hops is considered better. The maximum hop count in RIP is 15,
with a hop count of 16 indicating an unreachable route.
35. RIP routers send routing updates (known as Routing Information Protocol
Packets) to their neighboring routers every 30 seconds.
36. When a route becomes unreachable, RIP uses a technique called "route
poisoning" to inform other routers of the change. The route is marked as
unreachable with a hop count of 16, and this information is quickly propagated
to other routers.
37. RIP may take time to converge (stabilize) after a network change. The 30-second
update interval can result in relatively slow adaptation to network changes.
38. There are two main versions of RIP: RIP version 1 (RIPv1) and RIP version 2
(RIPv2). RIPv2 adds support for classless inter-domain routing (CIDR), VLSM
(Variable Length Subnet Masking), and authentication.
39. OSPF, or Open Shortest Path First, is a link-state routing protocol used in
computer networks to determine the optimal paths for data packets to traverse
from a source to a destination. It is a widely used interior gateway protocol (IGP)
and is designed to work within an autonomous system (AS), such as a corporate
network or an Internet service provider's network.
40. OSPF uses Dijkstra's shortest path algorithm to calculate the shortest path to all
destinations. This algorithm takes into account the link costs and constructs a
routing table based on the information gathered from other routers in the OSPF
domain.
41. OSPF supports Variable Length Subnet Masking (VLSM) and Classless Inter-
Domain Routing (CIDR), allowing for efficient use of IP address space.
43. OSPF routers can be classified into different types, including internal routers
(those within a single area), area border routers (connecting multiple areas), and
32
autonomous system boundary routers (connecting to routers outside the OSPF
domain).
47. EIGRP is primarily designed for routing within an autonomous system (AS), such
as an enterprise network.
48. EIGRP combines features of both distance vector and link-state routing
protocols, making it a robust and efficient option for routing.
50. EIGRP uses the Diffusing Update Algorithm (DUAL) to achieve rapid convergence
51. EIGRP uses a metric called the composite metric, which considers various
factors like bandwidth, delay, reliability, and load when determining the best
path to a destination.
52. Dual stacking :- EIGRP can handle both IPv4 and IPv6 routing, making it suitable
for networks that are transitioning to IPv6.
53. EIGRP uses various mechanisms to prevent routing loops, including split
horizon, route poisoning, and hold-down timers
57. Route announcements in EIGRP are triggered and sent neighbours using
224.0.0.10 multicast address.
33
58. EIGRP maintains neighbour relations for every 5 sec
59. EIGRP update messages are sent by Reliable transport protocol and route
the announcements are acknowledged.
Bandwidth: The minimum bandwidth of the slowest link in the path, usually
expressed in kilobits per second (Kbps).
Delay: The cumulative delay of all the links in the path, usually measured in tens
of microseconds (tens of microseconds or tens of picoseconds).
For Route A:
For Route B:
EIGRP Metric = [1 * (500 + 0 * 500)] * [1 * (20 + 0 * 20)] / 256
EIGRP Metric = 500 * 20 / 256
EIGRP Metric = 39.0625
Route B has a lower EIGRP metric, making it the preferred route for EIGRP
routing.
63. EIGRP (Enhanced Interior Gateway Routing Protocol) maintains several tables to
manage routing information and make routing decisions.
34
2. Topology Table (also known as the Diffusing Update Algorithm (DUAL)
Topology Table)
3. Routing Table
5. Interface Table
64. In EIGRP, you can configure stub routers and networks. When a router is
configured as a stub router, it will maintain a Stub Routing Table.
65. The Stub Routing Table contains summarized routes and default routes that can
be advertised to EIGRP neighbours.
66. Stube routing tables helps to reduce the size of the routing updates and
control which routes are propagated outside the stub area.
67. BGP maintains several tables to manage routing information and make routing
decisions.
BGP RIB-Failure
AS-Path (AS_PATH)
Next-Hop (NEXT_HOP)
35
Multi-Exit Discriminator (MED)
Origin (ORIGIN)
Communities( Communities are not used in BGP route selection but are used for
policy and filtering purposes.)
Atomic Aggregate:
Aggregator
Path Length ( BGP prefers shorter AS-Paths when selecting the best route )
2. A proxy server acts as an intermediary between a client (e.g., a user's device) and
a destination server (e.g., a website or another server).
4. Content Filtering:
Organizations often use proxy servers to filter and control the content accessed
by their network users.
This can be used to block access to certain websites or content types that
violate company policies or security protocols.
5. Caching:
Proxy servers can cache frequently accessed web content. This reduces the load
on the destination servers and speeds up content delivery to clients.
Cached content can be served to users without having to request it from the
original source repeatedly.
36
6. Security:
Proxies can provide security by acting as a firewall between a client and the
internet. They can inspect incoming and outgoing traffic for malicious content
and filter out harmful data.
7. Load Balancing:
In the context of data centers and web applications, proxy servers can distribute
incoming client requests among multiple servers to balance the load.
This ensures that no single server becomes overwhelmed and improves overall
system performance and availability.
8. Access Control:
Proxy servers can enforce access control policies, allowing or denying access to
specific resources or services based on user credentials, IP addresses, or other
criteria.
11. Web Acceleration: Proxy servers, especially content delivery networks (CDNs),
can accelerate web content delivery by serving content from geographically
distributed servers, reducing latency and improving load times.
12. Protocol Conversion: Some proxy servers can convert between different
network protocols, allowing clients and servers that use incompatible protocols
to communicate.
13. Proxy services are versatile and can be configured and customized to meet
various network and security requirements. However, it's essential to use them
responsibly, as they can also be used for malicious purposes, such as
concealing cyberattacks or engaging in illegal activities.
14. DNS, or Domain Name System, is a critical component of the internet that
translates human-readable domain names (e.g., www.example.com) into IP
addresses (e.g., 192.0.2.1) that computers and servers use to locate each other
on the network.
37
15. DNS services play a vital role in ensuring the functionality and accessibility of the
internet.
17. Hierarchy
The DNS hierarchy is organized into various levels or components, and the
complete domain name forms a structured hierarchy from right to left. Here's an
overview of the DNS hierarchy:
Root Level:
At the top of the hierarchy is the root level, denoted by a single dot (.). This level
contains the highest-level domain names in the DNS, such as .com, .org, .net,
and more.
Below the root level are the top-level domains (TLDs), which include generic
TLDs (gTLDs) like .com, .org, .net, and country code TLDs (ccTLDs) like .us
(United States), .uk (United Kingdom), and .ca (Canada).
These are specific domain names within a TLD. For example, in the domain name
"example.com," "example" is the second-level domain.
Subdomains:
Hostnames:
The hostname is the leftmost component of a fully qualified domain name
(FQDN). It represents a specific resource or server within a subdomain. For
example, in the FQDN "www.example.com," "www" is the hostname.
Resource Records:
38
Each level of the hierarchy can have associated resource records (RRs) in DNS
servers.
these records store information about the domain, such as IP addresses (A
records), mail exchange settings (MX records), and more.
18. DNS Servers: DNS services are provided by a network of DNS servers. These
servers can be categorized into various types, including:
Root Servers: These servers hold the information about the root domain and
provide referrals to the appropriate TLD servers.
19. Caching: DNS servers often cache resolved domain name-to-IP address
mappings for a specified period. Caching helps reduce the load on the DNS
infrastructure and speeds up future lookups for frequently accessed domains.
20. Dynamic Updates: DNS services can support dynamic updates, allowing
changes to domain records, such as adding or modifying IP addresses or mail
server configurations, to be reflected in the DNS system.
21. DNS Records: DNS services use various types of DNS records to store
information associated with domain names. Common DNS record types include
A records (for IPv4 addresses), AAAA records (for IPv6 addresses), MX records
(for mail servers), CNAME records (for aliases), and TXT records (for textual
information).
22. Security: DNS services are vulnerable to various attacks, such as DNS spoofing
and cache poisoning. To enhance security, DNSSEC (DNS Security Extensions) is
used to provide data integrity and authentication for DNS responses.
39
23. Load Balancing: DNS can be used for load balancing by distributing client
requests across multiple IP addresses associated with a domain. This can
improve the performance and availability of web services.
24. Content Delivery: Content delivery networks (CDNs) leverage DNS to route
users to the nearest server or cache, ensuring faster content delivery and
reducing latency.
CYBER SECURITY
In Two factor authentication the first factor is password and second factor
is One Time Password.
4. Use a firewall to monitor and control incoming and outgoing network traffic.
This helps prevent unauthorized access to your network.
6. Be cautious with email attachments and links. Verify the sender's authenticity
before clicking on links or downloading attachments.
Beware of phishing emails, which aim to trick you into revealing sensitive
information. Look for red flags like unusual email addresses or requests for
personal information.
40
Phishing is a type of cyberattack in which attackers attempt to trick individuals
into revealing sensitive information, such as usernames, passwords, credit card
numbers, or other personal or financial information, by posing as a trustworthy
entity. Phishing attacks are typically carried out through email, although they can
also occur via other communication channels like text messages (SMS), social
media, or instant messaging.
8. Secure Wi-Fi network with a strong password and encryption. Change default
router login credentials.
9. Use HTTPS-enabled websites for secure data transmission. Look for the padlock
icon in the browser's address bar.
A padlock icon typically indicates that a website is secure and that data
transmitted between the user's web browser and the website is encrypted.
11. Regular training and awareness programs can help in recognizing and mitigating
threats.
12. Protect physical access to your devices and systems. Lock your computer when
not in use, and secure servers and networking equipment in a controlled
environment.
14. Adjust privacy settings on social media and other online accounts to limit data
exposure.
15. ICT means Information Security act . The main components of ICT are
Confidentiality , integrity and availability
41
16. Types of attacks on Information system are malicious code attacks , Known
vulnerabilities , and configuration errors.
19. System Vulnerabilities to attack are use default user account and
password , remote access not disabled , logging and audit disabled , no
proper access control on files , non availability of updated antivirus and
firewall , and unnecessary services are running .
42
22. Technology and Defence
23.
43
24. Hackers
25. Black hat hackers use their technical skills to break into computer systems,
networks, or applications with the intent of exploiting vulnerabilities, stealing
data, spreading malware, or causing disruptions.
26. White hat hackers, also known as ethical hackers or security researchers, are
individuals who use their hacking skills for legitimate, lawful, and beneficial
purposes.
27. Gray hat hackers fall in a middle ground between white hat and black hat
hackers. Their actions can be ambiguous in terms of legality and ethics.
29. Executable viruses are a common type of computer virus that infects executable
files. These viruses attach their malicious code to legitimate executable files
(e.g., .exe, .dll), making them carriers for the virus.
30. Boot sector viruses target the master boot record (MBR) of a computer's hard
drive or removable storage devices (e.g., USB drives).
31. Email viruses are delivered through email attachments or embedded links. They
often use social engineering tactics to trick users into opening the infected
attachments or clicking on malicious links.
32. Macro viruses are a specific type of computer virus that target macros within
documents, typically in the context of productivity software like Microsoft Office
applications (e.g., Word, Excel, PowerPoint).
33. Computer worms are a type of malicious software (malware) that can self-
replicate and spread independently from one computer to another over
networks.
Unlike viruses, worms do not require a host file to attach themselves to; they are
standalone programs capable of propagating and infecting other systems.
Computer worms are known for their ability to rapidly spread and can cause
disruptions on a large scale.
44
34. The life cycle of worm contains creation and development , propagation , pay
load activation , concealment , response and mitigation , adaption and
evolution, end of life.
The goal of such attacks is to make the targeted service unavailable to its
intended users.
These messages are typically commercial or promotional in nature and are sent
without the explicit consent of the recipients.
Spam can also manifest in other digital communication channels, such as text
messages, instant messaging, and social media.
45
40. A keylogger, short for "keystroke logger," is a type of surveillance software or
hardware device designed to record and capture every keystroke made on a
computer or mobile device.
Keyloggers can record not only the actual keystrokes (i.e., the characters or keys
pressed), but also other types of input, such as mouse clicks and touchpad
movements.
The primary purpose of keyloggers is to monitor and record user activities, which
can have legitimate uses in certain contexts, but they are often used maliciously
for purposes like identity theft and espionage.
41. Desktop security, also known as endpoint security, refers to the measures and
practices employed to protect individual computers (desktops, laptops,
workstations) from various threats, vulnerabilities, and security risks.
42. A "zombie computer" (or "zombie PC") refers to a computer that has been
compromised by malware, typically a type of malicious software called a "bot" or
"botnet," and is under the control of a remote attacker.
Zombie computers are also sometimes called "bots" or "zombies" because they
are essentially used as mindless, automated agents to carry out various
malicious activities on behalf of the attacker
Firewalls examine data packets (the fundamental units of data transmission) and
decide whether to allow or block them based on predefined rules.
These rules are typically based on criteria such as source and destination IP
addresses, port numbers, and protocol type (e.g., TCP or UDP).
Stateful firewalls keep track of the state of active connections and make
decisions based on the context of the traffic.
46
This helps prevent unauthorized access through established connections.
Firewalls use ACLs to specify which types of traffic are allowed and denied.
ACLs can be configured to control traffic at the network and transport layer (IP
and TCP/UDP).
Some advanced firewalls can inspect and filter traffic at the application layer
(Layer 7 of the OSI model).
This allows them to make decisions based on specific applications, such as web
browsers or email clients.
48. Firewalls can act as proxy servers, intercepting traffic between clients and
servers. This can add an additional layer of security and anonymity for users.
49. Firewalls with NAT functionality can modify source and destination IP addresses
in network packets, which helps hide internal network structure from external
entities.
50. Many firewalls offer VPN functionality, allowing secure remote access and
encrypted communication over the internet.
51. Security policies define the behavior of the firewall. Policies specify what traffic
is allowed, blocked, or logged, and can be tailored to an organization's specific
security requirements.
52. Firewalls can be used to divide a network into segments with different security
requirements, enhancing overall security by limiting the attack surface.
47
BIG DATA AND CLOUD COMPUTING AND AI
1. Big Data refers to extremely large and complex datasets that cannot be easily
managed, processed, or analyzed using traditional data processing tools and
methods.
2. The Big data associated with "three Vs" concepts Volume , velocity and
Variety.
3. Volume: Big Data involves vast amounts of data that can range from terabytes to
petabytes and beyond. This data is often generated at high velocity and
accumulates rapidly.
4. Traditional data is stored in megabytes and gigabytes and big data stored in
Peptabytes and Zetta bytes . 1 Peptabyte = 10^15 bytes and 1 zetta byte = 10
^ 21 bytes.
5. Velocity: Data in the Big Data context is generated and collected at high speeds.
This includes real-time data from sources like social media, sensors, IoT devices,
and more.
6. Variety: Big Data encompasses various types of data, including structured data
(e.g., databases), semi-structured data (e.g., XML and JSON), and unstructured
data (e.g., text, images, videos). It can also include data from diverse sources,
such as social media, logs, and sensor data.
48
Handling Missing Values ,Data Standardization and Normalization, Handling
Inconsistent or Erroneous Values, Removing Duplicates ,Dealing with
Categorical Variables ,Feature Engineering . The data processing is done by
batch processing or stream processing.
We can use the dropna() function to remove the NaNs. axis=0 means that we
want to remove all rows that have a NaN value:
health_data.dropna(axis=0,inplace=True)
print(health_data)
The result is a data set without NaN rows:
49
Exploring data in data science involves analyzing and visualizing the dataset to
gain insights and understand its characteristics. Here are some examples of
techniques commonly used in data exploration:
Descriptive Statistics ,Data Visualization ,Data Profiling ,Exploratory Data
Analysis (EDA) ,Dimensionality Reduction, Time Series Analysis, Data
Segmentation, Interactive Exploration.
Refers to the process of using diverse analytical methods to review data and
arrive at relevant conclusions.
The interpretation of data helps researchers to categorize, manipulate, and
summarize the information in order to answer critical questions.
14. Managing and analyzing Big Data requires specialized technologies and
techniques. Some of the common tools and concepts associated with Big Data
are as follows.
15. Hadoop:
An open-source framework that allows for the distributed storage and processing
of large datasets across clusters of computers.
It consists of the Hadoop Distributed File System (HDFS) and the MapReduce
programming model.
It can handle structured and unstructured data.
17. YARN
stands for Yet Another Resource Negotiator, and it's a key component in Hadoop,
which is a framework for distributed storage and processing of large data sets.
YARN is responsible for managing and allocating resources (like CPU and
memory) across various applications running in a Hadoop cluster.
50
It supports stream and batcth processings.
18. SPARK
It's an open-source, distributed computing system that provides a fast and
general-purpose cluster-computing framework for big data processing.
Spark is designed for speed and ease of use, offering in-memory processing
capabilities that make it well-suited for iterative algorithms and interactive data
analysis.
It supports a variety of programming languages, including Scala, Java, Python,
and R, making it accessible to a wide range of developers.
Spark also includes libraries for data analysis (Spark SQL), machine learning
(MLlib), graph processing (GraphX), and stream processing (Spark Streaming),
making it a versatile tool for different big data use cases.
It can run on top of Hadoop Distributed File System (HDFS) and can also
integrate with other big data technologies.
19. Tableau
It is a data visualization and business intelligence software that allows users to
connect, visualize, and share data in a comprehensible and interactive way.
It's designed to help people see and understand their data by creating interactive
and shareable dashboards.
20. Power BI is another popular business intelligence tool that enables users to
visualize and analyze data, share insights across an organization, or embed them
in an app or website.
21. Big benefits of big data analytics are cost savings , product development and
market insights
22. Big challenges of Big data are making big data accessible , maintaining
quality table , keeping data secure and finding the right tools and plat form.
23. Apache Storm is an open-source, distributed stream processing system used for
real-time big data processing and analytics. It is designed to process large
amounts of data in a distributed and fault-tolerant manner.
51
GridGain supports distributed data storage and processing across a cluster of
machines.
On-Demand Self-Service:
Users can provision and manage computing resources as needed, without
requiring human intervention from the service provider.
Resource Pooling:
Cloud providers pool computing resources to serve multiple customers.
Resources are dynamically assigned and reassigned based on demand.
Rapid Elasticity:
Resources can be rapidly and automatically scaled up or down to accommodate
changing workloads. Users pay only for the resources they consume.
Measured Service: Cloud computing resources are metered, and users are
billed based on their actual usage. This pay-as-you-go model offers cost
efficiency.
52
Platform as a Service (PaaS): Offers a platform that includes the tools and
services needed to develop, test, and deploy applications without worrying
about underlying infrastructure.
Public Cloud: Services are provided by third-party vendors over the internet and
are available to the general public.
Hybrid Cloud: Combines public and private cloud models, allowing data and
applications to be shared between them. It provides greater flexibility and
optimization of existing infrastructure.
31. Leading cloud providers include Amazon Web Services (AWS), Microsoft Azure,
Google Cloud Platform (GCP), and others.
53
33. Cloud Infrastructure Layers:
34. Networking:
Internet: Cloud services are accessible over the internet.
Intranet: Allows communication between components within the cloud
infrastructure.
Load Balancers: Distribute incoming network traffic to optimize resource
utilization.
Identity and Access Management (IAM): Manages user identities and their
access to resources.
Logging and Auditing: Tracks activities and changes within the cloud
environment.
54
Automation: Enables automated provisioning, scaling, and management of
resources.
38. These components work together to provide the foundation for cloud computing
services, allowing users to access and utilize computing resources on-demand
with flexibility and scalability. The specific architecture may vary based on the
cloud service model, deployment model, and the provider's implementation.
39. Grid computing is often used interchangeably with the term "distributed
computing."
Both concepts involve the use of multiple computing resources to work on a
common task, and they share similarities in terms of resource sharing, parallel
processing, and collaboration across a network.
40. Grid computing mainly contains three nodes Control node , Provider and
user.
41. Control node in grid computing is server which administrates the network .
43. User in grid computing is a computer which uses the resources of the
network
44. Grid computing is mainly used in ATM.s Back end infra structure and
Marketing research
48. Narrow AI: A artificial intelligence is said to be narrow when the machine can
perform a specific task better than a human
55
49. General AI: An artificial intelligence reaches the general state when it can
perform any intellectual task with the same accuracy level as a human.
50. Strong AI: An AI is strong when it can beat humans in many tasks
51. AI is used for medical image analysis, assisting in the diagnosis of diseases such
as cancer. It also helps in identifying treatment options and predicting patient
outcomes.
52. AI accelerates drug discovery by analyzing biological data and predicting the
effectiveness of potential drugs.
54. Voice Assistants: NLP is used in voice-activated virtual assistants for tasks like
setting reminders, answering questions, and controlling smart devices.
55. Speech Recognition − It can handle different accents, slang words, noise in the
background, change in human‗ noise due to cold, etc.
56. Handwriting Recognition − The handwriting recognition software reads the text
written on paper by a pen or on screen by a stylus. It can recognize the shapes of
the letters and convert it into editable text
58. Machine Learning (ML) is a subset of artificial intelligence (AI) that focuses on
developing algorithms and statistical models that enable computers to learn
from data and make predictions or decisions without explicit programming.
56
60. Unsupervised Learning: Unsupervised learning involves training an algorithm
on an unlabeled dataset. The algorithm tries to find patterns, relationships, or
structures within the data without explicit guidance.
63. Deep learning is a subset of machine learning which provides the ability to
machine to perform human-like tasks without human involvement. It provides
the ability to an AI agent to mimic the human brain. DL can use both supervised
and unsupervised learning to train an AI agent
64. Neural Networks :- Deep learning models are typically based on artificial neural
networks, which are inspired by the structure and function of the human brain.
Neural networks consist of interconnected nodes organized into layers.
65. Deep learning involves training deep neural networks with multiple hidden
layers. These networks are capable of learning intricate patterns and
representations from data.
67. CNNs ( Convolution Neural Networks ) are a type of deep neural network
designed for processing structured grid data, such as images.
68. RNNs ( Recurrent Neural Networks ) are designed to handle sequential data,
such as time-series or natural language. They have recurrent connections that
allow information to persist over time.
69. Deep Learning Algorithms work on deep neural networks, so it is called deep
learning. These deep neural networks are made of multiple layers.
The first layer is called an Input layer, the last layer is called an output layer, and
all layers between these two layers are called hidden layers.
In the deep neural network, there are multiple hidden layers, and each layer is
composed of neurons. These neurons are connected in each layer.
57
The input layer receives input data, and the neurons propagate the input signal to
its above layers.
71. Robots are automated machines that can perform tasks autonomously or under
human control. Hence they are classified as automatically or semi-
automatically .
72. Machine vision refers to the technology and methods used to enable machines,
typically computers, to interpret and "see" the world through visual information.
74. Machine vision systems use cameras, sensors, and algorithms to analyze and
interpret images or video streams.
75. Speech recognition, also known as automatic speech recognition (ASR) or voice
recognition, is a technology that converts spoken language into written text.
76. ASR involves the use of algorithms and computational models to analyze and
interpret audio signals, identifying the words and phrases spoken by a user.
78. There are two types of speech recognition 1. Speaker Dependent 2. Speaker
Independent
58
81. Scikit-Learn: A simple and efficient tool for data analysis and machine learning
in Python, providing implementations of various algorithms.
82. Keras: An open-source high-level neural networks API written in Python that runs
on top of TensorFlow, Theano, or Microsoft Cognitive Toolkit.
83. MXNet: A flexible and efficient deep learning library that supports both symbolic
and imperative programming, developed by Apache Software Foundation.
86. Data Science and Analytics tools are Jupyter note book , Tableu
2. Example URL:
https://www.example.com:8080/path/to/resource?param=value#section
Scheme: https
Domain/Host: www.example.com
Port: 8080
Path: /path/to/resource
Query Parameters: param=value
Fragment/Anchor: #section
4. HTTP The communication protocol for the Web is the HTTP (See IETF RFC 2616)
protocol. HTTP is a simple request-reply protocol.
59
5. Hypertext Markup Language, or HTML, is the standard markup language used to
create and design documents on the World Wide Web.
6. HTML is the foundation of web pages and provides a structure for the content on
the web. HTML uses a system of tags and attributes to define elements within a
document.
11. Wikipedia has become one of the most popular sites on the Internet. It is used by
many as an authoritative source of information, from finding definitions of
techni- cal terms to explanations of current event
12. Flickr provides a platform for users to upload, store, and share their photos and
videos. It supports a wide range of media formats.
60
13. MySpace was one of the earliest and most influential social networking
platforms, allowing users to create personal profiles, connect with friends, and
share multimedia content.
14. A blog system, short for weblog system, refers to a platform or software that
facilitates the creation, publication, and management of blogs. A blog is a type of
website or online publication where individuals or groups share information,
opinions, and updates in a conversational and informal style.
15. According to Wikipedia, ―A blog is a Web site where entries are made in journal
style and displayed in a reverse chronological order.
16. Wiki systems refer to collaborative platforms that allow multiple users to create,
edit, and organize content collaboratively. The term "wiki" comes from the
Hawaiian word for "quick," reflecting the ease with which users can edit and
update content. Wikis are commonly used for knowledge-sharing,
documentation, and collaborative projects.
18. HTML stands for Hyper Text Markup Language. It is the standard markup
language for creating Web pages. It describes the structure of a Web page.
19. JavaScript makes HTML pages more dynamic and interactive. Common uses for
JavaScript are image manipulation, form validation, and dynamic changes of
content
20. CSS stands for Cascading Style Sheets. It is the language we use to style a Web
page. CSS describes how HTML elements are to be displayed on screen, paper,
or in other media
22. There are three main areas where PHP scripts are used 1) Server side scripting
2 ) Command Line scripting and 3) Writing Desktop applications
23. Java is a programming language and computing platform. Java is used to develop
mobile apps, web apps, desktop apps, games and much more. It was originally
designed for embedded network applications running on multiple platforms. It is
a portable, object-oriented, interpreted language
61
24. JDK is a software development environment used for making applets and Java
applications. The full form of JDK is Java Development Kit.
25. JRE ( Java Runtime Environment ) is a piece of software that is designed to run
other software
26. Java Virtual Machine (JVM) is an engine that provides a runtime environment to
drive the Java Code or applications. It converts Java bytecode into machine
language. JVM is a part of the Java Run Environment (JRE).
27. Python is High level general purpose language and developed by Guido Van
Rossam in the year 1989 .
28. High level language requires compilers and interpreters for translation into
machine code.
29. Low level languages requires assembler for direct translation into machine
language
31. The translator translates and executes the source code in the form of
statement by statement.
32. Compiler checks the source code and if the source code is error free it
generates object code.
36. In Python there are 35 Keywords ( Reserved Words ) used for some meaning
or functionality. Some of the key words are True , False , None , break ,
continue , class , global , pass , return , and , not , or , is , in , if , elif , else , while
etc
62
37. All key words starts with lower case letters except True , False and None (
they starts with capital letter )
43. IDLE means integrated development and learning environment and it is 100
percent pure Python using tkinter GUI tool kit . The Python installer for
Windows contains the IDLE module by default.
63
sign in with your gmail,
click on note book on the POP up Menu
Python Environment is created .
MULTIPLY BROADBAND
3. Entertainment Activities:
Web surfing (as today, but at higher speeds with more video content)
64
4. Consumer Activities:
Shopping (as today, but at higher speeds with more video content)
• Primary source of Internet bandwidth for retail users for application such as
Web browsing, e-commerce etc
• Dialup VPN (VPDN) user connects to NIB-II through the Narrow band RAS
and connected to its private network through a secure L2TP tunnel
established between Narrowband RAS and Broadband RAS.
65
• Support for both prepaid and postpaid Broadband services.
Distribution + Metro Core From Tier 2 Switch onward (towards the network)
The Aggregation Network for Multiplay will be in Ring Topology based on RPR
instead of the existing tree structure of Project 2.2. (for second layer of
aggregation, RPR is used).
66
10. Network Elements and servers of BB Multiplay Project
Hardware –
Miscellaneous Components
Converters, DSL Tester, Desktop/Laptop, UPS
Applications
PMS ---- Metasolve
Subscriber management --- Motive
Subscriber Self Service Centre--- Redback
Internet Policy Server – NetSweeper
AAA/SSSS -- Elitecore
DNS/DHCP -- ISC
eMS for above Hardware
Database – Oracle
67
12. Services on BB-Multiplay
F: Fault
C: Configuration
A: Accounting and Asset Management
P: Performance
S: Security.
END
68