Unit 1 Network and Security Study Notes
Unit 1 Network and Security Study Notes
Psar- A
I|Wbat aye be f
2.ist tie >spo nsibibtiet f data-lot keyer 2
3. raw tbe Etternet Format.
Codes
I4 bat is Switching?
s hat is flee lon bal ?
:ive -te Compaistn ef iniasts utist and
Part-B
Enplai Core
ay tion
eleborate -tha layered avchiteetuse of osr
medel and d'sutt tt fuetien each ayer.
4 ) 4ese ss the two types of nebworke en
Blue to ott arckiteetun.
) Evaluate the fetiens f Bla toth layes.
Nevfoee-oI
wkat is Csn9a/co ? ttowit detects Collisions
) State t e ewith real tie
Clannel bandwidts.
Cage ost reducties
Tnpves lateay o data Eransfs
1 hat is
level
a bit- Orien ted dala
dala lnt deyd
to sgport bott half- dglex ang fl dypler
Commin'ation Orer
peint - poist and mulbipo int
implemst Jootocel
b.olet is meant ?
Dre of te most Common ptools
t is the point - to- point
Hor peint - to- poin
(PrP). Tt ses
uses ooly one type f fine,
tecel
achieve kind of Gonelion - Oientef ervie
authentation.
Pest - B
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 1 Phvsical
Physical
Physical 1o 00:00000001011
layer 110 10101900000010111 layer
Transmission medium
Framing:
The data link layer divides the stream of bits received from the network layer into manageable
data units called frames.
Phvsical addressing:
If frames are to be distributed to different systems on the network, the data link layer adds a
header to the frame to define the sender and/or receiver of the frame.
Network Layer
The network layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks (links).
The data link layer oversees the delivery of the packet between two systems on the same network
(links), the network layer ensures that each packet gets from its point of origin to its final
destination.
If two systems are connected to the same link, there is usually no need for a network layer.
Transport Layer
The transport layer is responsible for process-to-process delivery of the entire message.
A process is an application program running on a host. Whereas the network layer oversees
source-to-destination delivery of individual packets, it does not recognize any relationship
between those packets.
It treats each one independently, as though cach piece belonged to a separate message, whether
or not it does.
The transport layer, on the other hand, ensures that the whole message arrives intact and inorder,
overseeing both error control and flow control at the source-to-destination level.
Session Laver
The services provided by the first three layers (physical, data link, and network) are not
sufficient for some processes.
The session layer is the network dialog controller.
It establishes, maintains, and synchronizes the interaction among communicating systems.
Presentation Layer
The presentation layer is concerned with the syntax and semantics of the information exchanged
between two systems.
Translation:
The processes (running programns) in two systems are usually exchanging information in the
form of character strings, numbers, and so on.
Application Layer
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information
services
Network virtual terminal.
Anetwork virtual terminal is a software version of aphysical terminal, and it allowsa user to log on to
aremote host.
File transfer, access, and management.
Mail services: Thisapplication provides the basis for email forwarding and storage,
Directory Services:_This application provides distributed database sources and access for global
information about various objects and services.
"A Bluetooth LAN is an ad hoc network, which means that the network is formed
spontancously; the devices, sometimes called gadgets, find cach other and make anetwork called
a piconet.
"A Bluetooth LAN can even be connected to the Internet ifone of the gadgets has this capability.
A Bluetooth LAN, by nature, cannot be large.
Applications:
" Peripheral devices such as a wireless mouse or keyboard can communicate with the
computer through this technology.
" Monitoring devices can communicate with sensor devices in a small health care center.
"Home security devices can use this technology to connect different sensors to the mainsecurity
controller.
"Conference attendees can synchronize their laptop computers at a conference. Bluetooth was
originally started as a project by the Ericsson Company. It is named for HaraldBlaatand,
the king of Denmark (940-981) who united Denmark and Norway.
Today, Bluetooth technology is the implementation of a protocol defined by the IEEE
802.15 standard. The standard defines a wireless personal-area network (PAN) operable in an
area the size of a room or a hall.
Architecture
Bluetooth defines two types of networks: piconet and scattemet.
Piconets:
ABluetooth network is called a piconet,or a small net.
" Apiconet can have up to eight stations, one of which is called the primary; the rest arecalled
secondaries.
" All the secondary stations synchronize their clocks and hopping sequence with theprimary.
A piconct can have only one
primary station.
The communication between the primary and secondary stations can be
one-to-one orone-to
many
Although a piconet can have a maximum of seven secondaries, additional secondariescan be
in the parked state.
A secondary in a parked state is synchronized with the primary, but
cannot take part in
communication until it is moved from the parked state to the active state.
Piconet
Primary
Scatternet:
Piconets can be combined to form what is called a scatternet.
A secondary station in one piconet can be the primary in another piconet.
This station can receive messages from the primary in the first piconet (as a secondary)and,
acting as a primary, deliver them to secondaries in the second piconet.
Astation can bea member of two piconets.
Piconet Piconet
Primary
(Secondary
3bits
N= 2740 for 5-slot frame
4 bits I|1 8 bits
This 18-bit part is repeated 3 times.
Access code. This 72-bit field normally contains synchronization bits and the identifier of the
primary to distinguish the frame of one piconct from that of another.
Header. This 54-bit field is a repeated 18-bit pattern. Each pattern has the following subfields:
a. Address-The 3-bit address subfield can define up to seven secondary (1 to 7). If the address is
zero, it is used for broadcast communication from the primary to all secondaries.
b. Type-The 4-bit type subfield defines the type of data coming from the upper layers.
Pavload. This subfield can be 0 to 2740 bits long. It contains data or control information
coming from the upper layers.
Band Bluetooth uses a 2.4-GHz ISM band divided into 79 channels of 1 MHz each.
FHSS Bluetooth uses the frequency-hopping spread spectrum (FHSs) method in the physical
layer to avoid interference from other devices or other networks
Modulation To transform bits to a signal, Bluetooth uses a sophisticated version of FSK, called
GFSK (FSK with Gaussian bandwidth filtering)