0% found this document useful (0 votes)
195 views19 pages

Unit 1 Network and Security Study Notes

Networks and security study notes

Uploaded by

subishasuza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
195 views19 pages

Unit 1 Network and Security Study Notes

Networks and security study notes

Uploaded by

subishasuza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

EC34ol: NETWOtKs ANE SEcueITy

Psar- A

I|Wbat aye be f
2.ist tie >spo nsibibtiet f data-lot keyer 2
3. raw tbe Etternet Format.

Codes

Defirt de-tee tion and

7Cfe tamming distane


8. -te Use of CRC.
?.1: disadvan byu f
Mentien. key adartayes and dida
Stsp ad Wait
lo.
(0. hat is DL 2 okaf are te thre medes
availatle in H0Lc fer lom munitatien ?
ll. ohat is mea t by PPp?

I4 bat is Switching?
s hat is flee lon bal ?
:ive -te Compaistn ef iniasts utist and
Part-B

.|Eplain stop and twai t preto col far borma/


lost Caue ARay o3
)Eplai Sleetive epeat DR fl Contrel
method.

Enplai Core
ay tion
eleborate -tha layered avchiteetuse of osr
medel and d'sutt tt fuetien each ayer.
4 ) 4ese ss the two types of nebworke en
Blue to ott arckiteetun.
) Evaluate the fetiens f Bla toth layes.
Nevfoee-oI
wkat is Csn9a/co ? ttowit detects Collisions
) State t e ewith real tie

6. Eplain tte fmetion ef winleas LaN or


lEE Eto2.) in de tail. Nov/Dee - Qo B8, Arslhay- s
7)oplain the dotagraa format of ipvy.
) nplain in detail about Oatagsam and Vtial
Civuit Aproack for packet Saitcking coibh a aet
disran. Nov/et- deli
BD0is uss in de t ail about HDLe nd PPP.
ia de tail abont the fran fovmat ad Contol
5.what 4wkat
bb |Pnetovke where eack
hysialGonecteran|didentify andatatat
in ackaew
ementhdy
kavig is
he the necassaY is
twloes Soure fls
egad are addnss ?
fle
le lode Uaigrely
hest for
-hu tanedis.. for addressan
is Sender
and Unver centrolContol?
emestt words
indpendet yestsii4 He
num sal
ber destination Ca d
dffevs
and of Commun pines
releiver.
send
it
Grespondiy addratea
Lagial bn to
Cnderging atons a
swlen hos
packt. set
Said Go t
botx 4n bo
veasvig of
Mentin -e adanbger of Piy babig
.T! is a be lter way to use availabl

Clannel bandwidts.
Cage ost reducties
Tnpves lateay o data Eransfs

1 hat is
level
a bit- Orien ted dala
dala lnt deyd
to sgport bott half- dglex ang fl dypler
Commin'ation Orer
peint - poist and mulbipo int
implemst Jootocel

b.olet is meant ?
Dre of te most Common ptools
t is the point - to- point
Hor peint - to- poin
(PrP). Tt ses
uses ooly one type f fine,
tecel
achieve kind of Gonelion - Oientef ervie
authentation.

Pest - B

0sI no del Aehitectue


. Blue tooth
5. Draw the OSI network architecture and explain the functionalities of each layer
detail?

THE OSI MODEL:


Established in 1947, the International Organization for Standardization (ISO) is a multinational
body dedicated to worldwide agreement on international standards.
An ISO standard that covers all aspects of network communications is the Open Systems
Interconnectíon (OS) model. It was first introduced in the late 1970s.
The purpose of the OSImodel is to show how to facilitate communication between different
systems without requiring changes to the logic of the underlying hardware and software.
model is not a protocol; it is a model for flexible, robust, and interoperation.
The OSI
separate but related layers, each of which defines a part of the process of
It consists of seven
moving information across a network.

Layer 7 Application

Layer 6 Presentation

Layer 5 Session

Layer 4 Transport
Layer 3 Network

Layer 2 Data link

Layer 1 Phvsical

Layers in the OSI Model:


Physical Layer:
Physical Layer The physical layer coordinates the functions required to carry a bit stream over
aphysical medium.
It deals with the mechanical and electrical specifications of the interface and transmission
medium.

From dta link layer To data link layer

Physical
Physical 1o 00:00000001011
layer 110 10101900000010111 layer

Transmission medium

Responsibilities of Physical Layer:


Data rate.
by the physical layer.
The transmission rate-the number of bits sent each second-is also defined
Synchronization of bits.
but also must be synchronized at the
The sender and receiver not only must use the same bit rate
bit level.
Data Link Laver:
The data link layer transforms the physical layer, a raw transmission facility, to a reliable link. It makes
the physical layer appear error-free to the upper layer.

From network layer To network layer

H2 DataT2 Frame H2 T2 Frame

Data link layer Data link layer

To physical layer Fram physicallayer

Framing:
The data link layer divides the stream of bits received from the network layer into manageable
data units called frames.
Phvsical addressing:
If frames are to be distributed to different systems on the network, the data link layer adds a
header to the frame to define the sender and/or receiver of the frame.
Network Layer
The network layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks (links).
The data link layer oversees the delivery of the packet between two systems on the same network
(links), the network layer ensures that each packet gets from its point of origin to its final
destination.

If two systems are connected to the same link, there is usually no need for a network layer.
Transport Layer
The transport layer is responsible for process-to-process delivery of the entire message.
A process is an application program running on a host. Whereas the network layer oversees
source-to-destination delivery of individual packets, it does not recognize any relationship
between those packets.
It treats each one independently, as though cach piece belonged to a separate message, whether
or not it does.

The transport layer, on the other hand, ensures that the whole message arrives intact and inorder,
overseeing both error control and flow control at the source-to-destination level.
Session Laver
The services provided by the first three layers (physical, data link, and network) are not
sufficient for some processes.
The session layer is the network dialog controller.
It establishes, maintains, and synchronizes the interaction among communicating systems.
Presentation Layer
The presentation layer is concerned with the syntax and semantics of the information exchanged
between two systems.
Translation:

The processes (running programns) in two systems are usually exchanging information in the
form of character strings, numbers, and so on.
Application Layer
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information
services
Network virtual terminal.
Anetwork virtual terminal is a software version of aphysical terminal, and it allowsa user to log on to
aremote host.
File transfer, access, and management.
Mail services: Thisapplication provides the basis for email forwarding and storage,
Directory Services:_This application provides distributed database sources and access for global
information about various objects and services.

To allow access to network


Application resources

To translate, encrypt, and Presentation


compress data
To establish, manage, and
Session terminate sessions

To provide reliable process-to


process message delivery and Transport
To move packets from source
error recovery
Network to destination; to provide
internetworking
To organize bits into frames; Data link
to provide hop-to-hop delivery To transmit bits over a medium:
Physical to provide mechanical and
clectrical specifications
16. Briefly explain the Bluetooth technology. List out the applications and limitations of Bluetooth
Technology?
BLUETOOTH
" Bluetooth is a wireless LAN technology desined to connect devices of different functions
such as telephones, notebooks, computers ,cameras, printers, and even coffee makers when they
are at a short distance from each other.

"A Bluetooth LAN is an ad hoc network, which means that the network is formed
spontancously; the devices, sometimes called gadgets, find cach other and make anetwork called
a piconet.
"A Bluetooth LAN can even be connected to the Internet ifone of the gadgets has this capability.
A Bluetooth LAN, by nature, cannot be large.
Applications:
" Peripheral devices such as a wireless mouse or keyboard can communicate with the
computer through this technology.
" Monitoring devices can communicate with sensor devices in a small health care center.
"Home security devices can use this technology to connect different sensors to the mainsecurity
controller.

"Conference attendees can synchronize their laptop computers at a conference. Bluetooth was
originally started as a project by the Ericsson Company. It is named for HaraldBlaatand,
the king of Denmark (940-981) who united Denmark and Norway.
Today, Bluetooth technology is the implementation of a protocol defined by the IEEE
802.15 standard. The standard defines a wireless personal-area network (PAN) operable in an
area the size of a room or a hall.

Architecture
Bluetooth defines two types of networks: piconet and scattemet.
Piconets:
ABluetooth network is called a piconet,or a small net.
" Apiconet can have up to eight stations, one of which is called the primary; the rest arecalled
secondaries.

" All the secondary stations synchronize their clocks and hopping sequence with theprimary.
A piconct can have only one
primary station.
The communication between the primary and secondary stations can be
one-to-one orone-to
many
Although a piconet can have a maximum of seven secondaries, additional secondariescan be
in the parked state.
A secondary in a parked state is synchronized with the primary, but
cannot take part in
communication until it is moved from the parked state to the active state.
Piconet
Primary

Secondary Secondary Secondary Secondary

Scatternet:
Piconets can be combined to form what is called a scatternet.
A secondary station in one piconet can be the primary in another piconet.
This station can receive messages from the primary in the first piconet (as a secondary)and,
acting as a primary, deliver them to secondaries in the second piconet.
Astation can bea member of two piconets.

Piconet Piconet
Primary

(Secondary

Secondary Secondary Secondaryi Primury/


Secondary
Secondary
Frame Format
A frame in the baseband layer can be one of three types: one-slot, three-slot, or fiveslot. A slot,
as we said before, is 62S s .
In a one-slot frame exchange, 259 us is needed for hopping and control mechanisms. This means
that aone-slot frame can last only 625 259,or 366 us.
fo nneglot frame is 366 bits
72 bits 54 bits 0 to N bits

Access code Header Payload

N= 240 for 1-slot frame

|Address TypeFA|S HEC N= 1490 for 3-slot frame

3bits
N= 2740 for 5-slot frame
4 bits I|1 8 bits
This 18-bit part is repeated 3 times.

Access code. This 72-bit field normally contains synchronization bits and the identifier of the
primary to distinguish the frame of one piconct from that of another.
Header. This 54-bit field is a repeated 18-bit pattern. Each pattern has the following subfields:
a. Address-The 3-bit address subfield can define up to seven secondary (1 to 7). If the address is
zero, it is used for broadcast communication from the primary to all secondaries.
b. Type-The 4-bit type subfield defines the type of data coming from the upper layers.
Pavload. This subfield can be 0 to 2740 bits long. It contains data or control information
coming from the upper layers.
Band Bluetooth uses a 2.4-GHz ISM band divided into 79 channels of 1 MHz each.

FHSS Bluetooth uses the frequency-hopping spread spectrum (FHSs) method in the physical
layer to avoid interference from other devices or other networks
Modulation To transform bits to a signal, Bluetooth uses a sophisticated version of FSK, called
GFSK (FSK with Gaussian bandwidth filtering)

You might also like