0% found this document useful (0 votes)
220 views127 pages

Department of Electronics & Communication Computer Networks (Cs1302)

This document provides an overview of the objectives and content covered in a Computer Networks course. The course aims to introduce concepts, terminology, and technologies used in modern data communication and computer networking. It will cover topics such as data communication components, the OSI model, transmission media, protocols and standards, network topologies, and data link layer functions and protocols including error detection/correction, flow control, and ARQ protocols.

Uploaded by

anon-767742
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
220 views127 pages

Department of Electronics & Communication Computer Networks (Cs1302)

This document provides an overview of the objectives and content covered in a Computer Networks course. The course aims to introduce concepts, terminology, and technologies used in modern data communication and computer networking. It will cover topics such as data communication components, the OSI model, transmission media, protocols and standards, network topologies, and data link layer functions and protocols including error detection/correction, flow control, and ARQ protocols.

Uploaded by

anon-767742
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 127

Department of Electronics &

communication
COMPUTER NETWORKS(CS1302)
by A.Asha
AIM:
– To introduce the concept ,terminologies and
technologies used in modern data
communication and computer networking.
• OBJECTIVES:
– To introduce the students the functions of
different layers.
– To introduce IEEE standard employed in
computer networking.
– To make students to get familiarized with
different protocols and network components
Unit I

• DATA COMMUNICATIONS
8
• Components – Direction of Data flow
– networks – Components and
Categories – types of Connections –
Topologies –Protocols and Standards
– ISO / OSI model – Transmission
Media – Coaxial Cable – Fiber Optics –
Line Coding – Modems – RS232
Interfacing sequences
Line Configuration -
Topology
• physical arrangement of stations on
medium
– point to point - two stations
• such as between two routers / computers
– multi point - multiple stations
• traditionally mainframe computer and
terminals
• now typically a local area network (LAN)
Line Configuration - Duplex
• simplex
– one direction eg. television
• half duplex (two-way alternate)
– only one station may transmit at a time
– requires one data path
• full duplex (two-way simultaneous)
– simultaneous transmission and reception
between two stations
– requires two data paths
• separate media or frequencies used for
each direction or echo canceling
Transmission Terminology

• data transmission occurs between a


transmitter & receiver via some
medium
• guided medium
– eg. twisted pair, coaxial cable, optical
fiber
• unguided / wireless medium
– eg. air, water, vacuum
Transmission Media-
Overview
• guided - wire / optical fibre
• unguided - wireless
• characteristics and quality
determined by medium and signal
– in unguided media - bandwidth
produced by the antenna is more
important
– in guided media - medium is more
important
Transmission Characteristics of
Guided Media

  Frequency Typical Typical Repeater


Range Attenuatio Delay Spacing
Twisted pair 0 to 3.5 kHz n
0.2 dB/km 50 µs/km 2 km
(with @ 1 kHz
loading)
Twisted 0 to 1 MHz 0.7 dB/km 5 µs/km 2 km
pairs (multi- @ 1 kHz
pair cables)
Coaxial 0 to 500 7 dB/km @ 4 µs/km 1 to 9 km
cable MHz 10 MHz
Optical fiber 186 to 370 0.2 to 0.5 5 µs/km 40 km
THz dB/km
Twisted Pair - Transmission
Characteristics
• analog
– needs amplifiers every 5km to 6km
• digital
– can use either analog or digital signals
– needs a repeater every 2-3km
• limited distance
• limited bandwidth (1MHz)
• limited data rate (100MHz)
• susceptible to interference and noise
Unshielded vs Shielded
• unshielded Twisted Pair (UTP)
– ordinary telephone wire
– cheapest
– easiest to install
– suffers from external EM interference
• shielded Twisted Pair (STP)
– metal braid or sheathing that reduces
interference
– more expensive
– harder to handle (thick, heavy)
• in a variety of categories - see EIA-568
Near End Crosstalk

• coupling of signal from one pair to


another
• occurs when transmit signal entering
the link couples back to receiving
pair
• ie. near transmitted signal is picked
up by near receiving pair
Coaxial Cable
Optical Fiber - Benefits

• greater capacity
– data rates of hundreds of Gbps
• smaller size & weight
• lower attenuation
• electromagnetic isolation
• greater repeater spacing
– 10s of km at least
Optical Fiber - Transmission
Characteristics
• uses total internal reflection to transmit
light
– effectively acts as wave guide for 1014 to 1015
Hz
• can use several different light sources
– Light Emitting Diode (LED)
• cheaper, wider operating temp range, lasts
longer
– Injection Laser Diode (ILD)
• more efficient, has greater data rate
• relation of wavelength, type & data rate
Cable Modems
• dedicate two cable TV channels to data
transfer
• each channel shared by number of
subscribers, using statistical TDM
• Downstream
– cable scheduler delivers data in small packets
– active subscribers share downstream capacity
– also allocates upstream time slots to
subscribers
• Upstream
– user requests timeslots on shared upstream
Cable Modem Scheme
UNIT II

• DATA LINK LAYER 12


• Error – detection and correction –
Parity – LRC – CRC – Hamming code –
Flow Control and Error control: stop
and wait – go back N ARQ – selective
repeat ARQ- sliding window
techniques – HDLC.
• LAN: Ethernet IEEE 802.3, IEEE
802.4, and IEEE 802.5 – IEEE 802.11–
responsibilities of data
link layer
• a) Framing
• b) Physical addressing
• c) Flow control
• d) Error control
• e) Access control
2.1 Error – detection and correction

• 2 types of errors
• a) Single-bit error.
• b) Burst-bit error.
• parity
– parity bit set so character has even
(even parity) or odd (odd parity) number
of ones
– even number of bit errors goes
undetected
Error Detection Process
4 types of redundancy
checks
• a) Vertical redundancy checks (VRC). The
most common and least expensive mechanism for error detection
is the vertical
• redundancy check (VRC) often called a parity check. In this
technique a redundant bit 3 called a parity bit, is appended to
every data unit so, that the total number of 0’s in the unit
(including the parity bit) becomes even.
• b) Longitudinal redundancy checks (LRC).
In longitudinal redundancy check (LRC), a block of bits is
divided into rows and a
• redundant row of bits is added to the whole block.
• c) Cyclic redundancy checks (CRC). A CRC
checker functions exactly like a generator. After receiving the data
appended with the CRC it does the same modulo-2 division.
If the remainder is all 0’s the CRC is dropped and the data
accepted. Otherwise, the received stream of bits is discarded and
Cyclic Redundancy Check
• one of most common and powerful checks
• The sender follows these steps
• a) The units are divided into k sections each of n bits.
• b) All sections are added together using 2’s complement to
get the sum.
• c) The sum is complemented and become the checksum.
• d) The checksum is sent with the data.
Error Correction Process
Flow Control

• ensure sending entity does not


overwhelm receiving entity
– by preventing buffer overflow
• influenced by:
– transmission time
• time taken to emit all bits into medium
– propagation time
• time for a bit to traverse the link
• assume here no errors but varying
Stop and Wait

• source transmits frame


• destination receives frame and
replies with acknowledgement (ACK)
• source waits for ACK before sending
next
• destination can stop flow by not send
ACK
• works well for a few large frames
• Stop and wait becomes inadequate if
Stop and Wait Link
Utilization
Sliding Windows Flow
Control
• allows multiple numbered frames to be in
transit
• receiver has buffer W long
• transmitter sends up to W frames without
ACK
• ACK includes number of next frame
expected
• sequence number is bounded by size of
field (k)
– frames are numbered modulo 2k
– giving max window size of up to 2k - 1
Sliding Window Diagram
Sliding Window Example
Error Control

• detection and correction of errors


such as:
– lost frames
– damaged frames
• common techniques use:
– error detection
– positive acknowledgment
– retransmission after timeout
– negative acknowledgement &
Automatic Repeat Request
(ARQ)
• collective name for such error control
mechanisms, including:
• stop and wait
• go back N
• selective reject (selective
retransmission)
Stop and Wait
• source transmits single frame
• wait for ACK
• if received frame damaged, discard it
– transmitter has timeout
– if no ACK within timeout, retransmit
• if ACK damaged,transmitter will not
recognize it
– transmitter will retransmit
– receive gets two copies of frame
– use alternate numbering and ACK0 /
Stop and wait
see example with both types of errors
pros and cons
simple
inefficient
Go Back N

• based on sliding window


• if no error, ACK as usual
• use window to control number of
outstanding frames
• if error, reply with rejection
– discard that frame and all future frames
until error frame received correctly
– transmitter must go back and retransmit
that frame and all subsequent frames
Go Back N - Handling

• Damaged Frame
– error in frame i so receiver rejects frame
i
– transmitter retransmits frames from i
• Lost Frame
– frame i lost and either
• transmitter sends i+1 and receiver gets
frame i+1 out of seq and rejects frame i
• or transmitter times out and send ACK with
P bit set which receiver responds to with
Go Back N - Handling
• Damaged Acknowledgement
– receiver gets frame i, sends ack (i+1) which is
lost
– acks are cumulative, so next ack (i+n) may
arrive before transmitter times out on frame i
– if transmitter times out, it sends ack with P bit
set
– can be repeated a number of times before a
reset procedure is initiated
• Damaged Rejection
– reject for damaged frame is lost
Selective Reject
• also called selective retransmission
• only rejected frames are retransmitted
• subsequent frames are accepted by the
receiver and buffered
• minimizes retransmission
• receiver must maintain large enough
buffer
• more complex logic in transmitter
• hence less widely used
• useful for satellite links with long
Go Back N vs
Selective Reject
High Level Data Link Control
(HDLC)
• an important data link control
protocol
• specified as ISO 33009, ISO 4335
• station types:
– Primary - controls operation of link
– Secondary - under control of primary
station
– Combined - issues commands and
responses
HDLC Transfer Modes
• Normal Response Mode (NRM)
– unbalanced config, primary initiates transfer
– used on multi-drop lines, eg host + terminals
• Asynchronous Balanced Mode (ABM)
– balanced config, either station initiates
transmission, has no polling overhead, widely
used
• Asynchronous Response Mode (ARM)
– unbalanced config, secondary may initiate
transmit without permission from primary,
rarely used
HDLC Frame Structure

• synchronous transmission of frames


• single frame format used
Address Field

• identifies secondary station that sent


or will receive frame
• usually 8 bits long
• may be extended to multiples of 7
bits
– LSB indicates if is the last octet (1) or
not (0)
• all ones address 11111111 is
broadcast
Control Field
• different for different frame type
– Information - data transmitted to user (next
layer up)
•Flow and error control piggybacked on
information frames
– Supervisory - ARQ when piggyback not
used
– Unnumbered - supplementary link control
• first 1-2 bits of control field identify frame
type
Control Field
• use of Poll/Final bit depends on context
• in command frame is P bit set to1 to solicit (poll) response
from peer
• in response frame is F bit set to 1 to indicate response to
soliciting command
• seq number usually 3 bits
– can extend to 8 bits as shown below
Information & FCS Fields

• Information Field
– in information and some unnumbered
frames
– must contain integral number of octets
– variable length
• Frame Check Sequence Field (FCS)
– used for error detection
– either 16 bit CRC or 32 bit CRC
HDLC Operation
• consists of exchange of information,
supervisory and unnumbered frames
• have three phases
– initialization
• by either side, set mode & seq
– data transfer
• with flow and error control
• using both I & S-frames (RR, RNR, REJ, SREJ)
– disconnect
• when ready or fault noted
Timers and time registers
in FDDI.
• Time registers
– Synchronous allocation(SA)
– Target token rotation time(TTRT)
– Absolute maximum time(AMT)
• Timers
– Token rotation timer(TRT)
– Token holding timer(THT)
Ethernet.
• Access method :CSMA/CD
• Addressing
• Electrical specification
• Frame format
• Implementation
• 10 base 5 :Thick Ethernet
• 10 base 2 :Thin Ethernet
• 10 base T :Twisted-pair Ethernet
• 1 base 5 :Star LAN
UNIT III

• NETWORK LAYER 10
• Internetworks - Packet Switching and
Datagram approach – IP addressing
methods – Subnetting – Routing –
Distance Vector Routing – Link State
Routing – Routers
Packet Switching

• circuit switching was designed for


voice
• packet switching was designed for
data
• transmitted in small packets
• packets contains user data and
control info
– user data may be part of a larger
message
Advantages

• line efficiency
– single link shared by many packets over
time
– packets queued and transmitted as fast
as possible
• data rate conversion
– stations connects to local node at own
speed
– nodes buffer data if required to equalize
rates
Switching Techniques

• Datagram approach
• Virtual circuit approach
• Switched virtual circuit(SVC)
• Permanent virtual circuit(PVC)
• Circuit – switched connection versus
virtual – circuit connection
– Path versus route
– Dedicated versus shared
Virtual Circuits v Datagram

• virtual circuits
– network can provide sequencing and
error control
– packets are forwarded more quickly
– less reliable
• datagram
– no call setup phase
– more flexible
– more reliable
Routing in Packet Switched
Network
• key design issue for (packet) switched
networks
• select route across network between end
nodes
• characteristics required:
– correctness
– simplicity
– robustness
– stability
– fairness
– optimality
Routing Strategies - Fixed
Routing
• use a single permanent route for
each source to destination pair
• determined using a least cost
algorithm
• route is fixed
– at least until a change in network
topology
– hence cannot respond to traffic changes
• advantage is simplicity
Distance vector routing and
link state routing.
• Distance vector routing
– Sharing information
– Routing table
– Creating the table
– Updating the table
– Updating algorithm
• Link state routing
– Information sharing
– Packet cost
– Link state packet
– Getting information about neighbors
– Initialization
– Link state database
Bridges

• Types of bridges
– Simple bridge
– Multiport bridge
– Transparent bridge
Subnetting

• Three levels of hierarchy


• Masking
– Masks without subnetting
– Masks with subnetting
• Finding the subnetwork address
– Boundary level masking
– Non-boundary level masking
UNIT IV

• TRANSPORT LAYER
8
• Duties of transport layer –
Multiplexing – Demultiplexing –
Sockets – User Datagram Protocol
(UDP) – Transmission Control
Protocol (TCP) – Congestion Control –
Quality of services (QOS) –
Integrated Services.
Duties of transport layer

• end-to-end data transfer service


• shield upper layers from network
details
• reliable, connection oriented
– has greater complexity
– eg. TCP
• best effort, connectionless
– datagram
– eg. UDP
Multiplexing

• of upper layers (downward


multiplexing)
– so multiple users employ same transport
protocol
– user identified by port number or
service access point
• may also multiplex with respect to
network services used (upward
multiplexing)
– eg. multiplexing a single virtual X.25
Sockets
• process sends/receives messages to/from
its socket
• socket analogous to mailbox
• sending process relies on transport
infrastructure which brings message to
socket at receiving process
User Datagram Protocol
(UDP)
• connectionless service for application level
procedures specified in RFC 768
– unreliable
– delivery & duplication control not guaranteed
• reduced overhead
• least common denominator service
• uses:
– inward data collection
– outward data dissemination
– request-response
– real time application
TCP
• Transmission Control Protocol (RFC 793)
• connection oriented, reliable
communication
• over reliable and unreliable
(inter)networks
• two ways of labeling data:
• data stream push
– user requires transmission of all data up to
push flag
– receiver will deliver in same manner
– avoids waiting for full buffers
TCP Services

• a complex set of primitives:


– incl. passive & active open, active open
with data, send, allocate, close, abort,
status
– passive open indicates will accept
connections
– active open with data sends data with
open
• and parameters:
– incl. source port, destination port &
TCP Header
TCP and IP

• not all parameters used by TCP are in


its header
• TCP passes some parameters down
to IP
– precedence
– normal delay/low delay
– normal throughput/high throughput
– normal reliability/high reliability
– security
TCP Mechanisms
Connection Establishment
• three way handshake
– SYN, SYN-ACK, ACK
• connection determined by source
and destination sockets (host, port)
• can only have a single connection
between any unique pairs of ports
• but one port can connect to multiple
different destinations (different
ports)
TCP Mechanisms
Data Transfer
• data transfer a logical stream of octets
• octets numbered modulo 223
• flow control uses credit allocation of
number of octets
• data buffered at transmitter and receiver
– sent when transport entity ready
– unless PUSH flag used to force send
• can flag data as URGENT, sent
immediately
• if receive data not for current connection,
TCP Mechanisms
Connection Termination
• graceful close
– TCP user issues CLOSE primitive
– transport entity sets FIN flag on last
segment sent with last of data
• abrupt termination by ABORT
primitive
– entity abandons all attempts to send or
receive data
– RST segment transmitted to other end
TCP Implementation Options

• TCP standard precisely specifies


protocol
• have some implementation policy
options:
– send
– deliver
– accept
– retransmit
– acknowledge
Congestion Control

• flow control also used for congestion


control
– recognize increased transit times &
dropped packets
– react by reducing flow of data
• RFC’s 1122 & 2581 detail extensions
– Tahoe, Reno & NewReno
implementations
• two categories of extensions:
Retransmission Timer
Management
• static timer likely too long or too
short
• estimate round trip delay by
observing pattern of delay for recent
segments
• set time to value a bit greater than
estimate
• simple average over a number of
segments
Exponential RTO Backoff

• timeout probably due to congestion


– dropped packet or long round trip time
• hence maintaining RTO is not good
idea
• better to increase RTO each time a
segment is
re-transmitted
– RTO = q*RTO
– commonly q=2 (binary exponential
Karn’s Algorithm
• if segment is re-transmitted, ACK may be
for:
– first copy of the segment (longer RTT than
expected)
– second copy
• no way to tell
• don’t measure RTT for re-transmitted
segments
• calculate backoff when re-transmission
occurs
Window Management
• slow start
– larger windows cause problem on connection
created
– at start limit TCP to 1 segment
– increase when data ACK, exponential growth
• dynamic windows sizing on congestion
– when a timeout occurs perhaps due to
congestion
– set slow start threshold to half current
congestion window
– set window to 1 and slow start until threshold
Window Management
Fast Retransmit
Fast Recovery
• retransmit timer rather longer than
RTT
• if segment lost TCP slow to
retransmit
• fast retransmit
– if receive 4 ACKs for same segment then
immediately retransmit since likely lost
• fast recovery
– lost segment means some congestion
Effects of
Congestion
Mechanisms for
Congestion Control
Backpressure
• if node becomes congested it can slow
down or halt flow of packets from other
nodes
– cf. backpressure in blocked fluid pipe
– may mean that other nodes have to apply
control on incoming packet rates
– propagates back to source
• can restrict to high traffic logical
connections
• used in connection oriented nets that
allow hop by hop congestion control (eg.
Choke Packet

• a control packet
– generated at congested node
– sent to source node
– eg. ICMP source quench
• from router or destination
• source cuts back until no more source
quench message
• sent for every discarded packet, or
anticipated
• is a rather crude mechanism
Implicit Congestion
Signaling
• transmission delay increases with
congestion
• hence a packet may be discarded
• source detects this implicit
congestion indication
• useful on connectionless (datagram)
networks
– eg. IP based
• (TCP includes congestion and flow control -
see chapter 17)
Explicit Congestion
Signaling
• network alerts end systems of
increasing congestion
• end systems take steps to reduce
offered load
• Backwards
– congestion avoidance notification in
opposite direction to packet required
• Forwards
– congestion avoidance notification in
same direction as packet required
Integrated Services

• changes in traffic demands require


variety of quality of service
– eg. internet phone, multimedia,
multicast
• new functionality required in routers
• new means of requesting QoS
• IETF developing a suite of Integrated
Services Architecture (ISA) standards
• RFC 1633 defines overall view of ISA
ISA Approach
• IP nets control congestion by
– routing algorithms
– packet discard
• ISA provides enhancements to
traditional IP
• in ISA associate each packet with a
flow
• ISA functions:
– admission control
– routing algorithm
ISA in Router
ISA Services
• Guaranteed
– assured data rate
– upper bound on queuing delay
– no queuing loss
• Controlled load
– approximates best effort behavior on unloaded
net
– no specific upper bound on queuing delay
– very high delivery success
• Best Effort
– traditional IP service
Token Bucket Scheme
Queuing Discipline
• traditionally FIFO
– no special treatment for high priority flow
packets
– large packet can hold up smaller packets
– greedy connection can crowd out less greedy
connection
• need some form of fair queuing
– multiple queues used on each output port
– packet is placed in queue for its flow
– round robin servicing of queues
– can have weighted fair queuing
UNIT V

• APPLICATION LAYER
7
• Domain Name Space (DNS)
• SMTP
• FDP
• HTTP
• WWW
• Security
5. 1 DNS
The Internet Directory Service
• the Domain Name Service (DNS)
provides mapping between host
name & IP address
• defined in RFCs 1034 / 1035
• key elements
– domain name space
– DNS database
– name servers
– name resolvers
Domain Names
DNS Database

• hierarchical database
• containing resource records (RRs)
• features
– variable-depth hierarchy for names
– distributed database
– distribution controlled by database
• provides name-to-address directory
service for network applications
Resource Records (RRs)
DNS Operation
DNS Server Hierarchy

• DNS database is distributed


hierarchically
– may extend as deep as needed
• any organization owning a domain
can run name servers
• each server manages authoritative
name data for a zone
• 13 root name servers at top of
hierarchy share responsibility for top
Name Resolution
• query begins with name resolver on
host
• knows name/address of local DNS
server
• given a name request, the resolver
can:
– return name from cache if already
known
– send DNS query to local server which
may return answer, or query other
servers
5.2 SMTP
• RFC 821
• not concerned with format of messages or
data
– covered in RFC 822 (see later)
• SMTP uses info written on envelope of mail
– message header
• does not look at contents
– message body
• except:
– standardize message character set to 7 bit
Basic Operation

• email message is created by user


agent program (mail client), and
consists of:
– header with recipient’s address and
other info
– body containing user data
• messages queued and sent as input
to SMTP sender program
– yypically a server process (daemon on
UNIX)
SMTP Mail Flow
Mail Message Contents
• each queued message has two parts
• message text
– RFC 822 header with envelope and list of
recipients
– message body, composed by user
• list of mail destinations
– derived by user agent from header
– may be listed in header
– may require expansion of mailing lists
– may need replacement of mnemonic names
with mailbox names
• if BCCs indicated, user agent needs to
SMTP Sender
• takes message from queue
• transmits to proper destination host
– via SMTP transaction
– over one or more TCP connections to
port 25
• host may have multiple senders
active
• host must create receivers on
demand
• when delivery complete, sender
SMTP Protocol - Reliability

• used to transfer messages from


sender to receiver over TCP
connection
• attempts to provide reliable service
• no guarantee to recover lost
messages
• no end to end acknowledgement to
originator
• error indication delivery not
SMTP Receiver

• accepts arriving message


• places in user mailbox or copies to
outgoing queue for forwarding
• receiver must:
– verify local mail destinations
– deal with errors
• sender responsible for message until
receiver confirm complete transfer
– indicates mail has arrived at host, not
SMTP Forwarding

• mostly direct transfer from sender


host to receiver host
• may go through intermediate
machine via forwarding capability
– sender can specify route
– target user may have moved
SMTP Replies
• positive completion reply (2xx)
– e.g. 220 <domain> Service ready
– e.g. 250 Requested mail action okay, completed
• positive intermediate reply (3xx)
– e.g. 354 Start mail input; end with <CRLF>.<CRLF>
• transient negative completion reply (4xx)
– e.g. 452 Requested action not taken: insufficient system 
storage
• permanent negative completion reply
(5xx)
– e.g. 500 Syntax error, command unrecognized 
– e.g. 550 Requested action not taken: mailbox unavailable 
FTP

• Transfer a file from one system to


another.
• TCP connections
• Basic model of FTP
5.4 Hypertext Transfer Protocol
HTTP
• base protocol for World Wide Web
• for any hypertext client/server
application
• is a protocol for efficiently
transmitting information to make
hypertext jumps
– can transfer plain text, hypertext, audio,
images, and Internet accessible
information
HTTP Overview
• transaction oriented client/server protocol
• between Web browser (client) and Web
server
• uses TCP connections
• stateless
– each transaction treated independently
– each new TCP connection for each transaction
– terminate connection when transaction
complete
• flexible format handling
HTTP Operation - Caches

• often have a web cache


• stores previous requests/ responses
• may return stored response to
subsequent requests
• may be a client, server or
intermediary system
• not all requests can be cached
Intermediate HTTP Systems
HTTP Messages
HTTP Messages BNF Format
HTTP-Message = Simple-Request | Simple-
Response | Full-Request | Full-Response
Full-Request = Request-Line
*( General-Header | Request-Header | Entity-
Header )
CRLF
[ Entity-Body ]
Full-Response = Status-Line
*( General-Header | Response-Header | Entity-
Header )
CRLF
[ Entity-Body ]
Simple-Request = "GET" SP Request-URL CRLF
HTTP General Header Fields

• Cache-Control
• Connection
• Data
• Forwarded
• Keep-Alive
• Mime-Version
• Pragma
• Upgrade
Request Methods

• request-line has
– method
– Request URL
– HTTP version
– Request-Line = Method Request-URL HTTP-
Version CRLF
• HTTP/1.1 methods:
– OPTIONS, GET, HEAD, POST, PUT,
PATCH, COPY, MOVE, DELETE, LINK,
UNLINK, TRACE, WRAPPED, Extension-
Status Codes

• informational - headers only


• successful - headers & body if
relevant
• redirection - further action needed
• client error - has syntax or other
error
• server error - failed to satisfy valid
request
Response Header Fields

• Location
• Proxy-Authentication
• Public
• Retry-After
• Server
• WWW-Authenticate
Entity Header Fields
• Allow • Expires
• Content-Encoding • Last-Modified
• Content-Language • Link
• Content-Length
• Content-MD5
• Title
• Content-Range • Transfer-
• Content-Type Encoding
• Content-Version • URL-Header
• Derived-From • Extension-
Entity Body

• entity body is an arbitrary sequence


of octets
• HTTP can transfer any type of data
including:
– text, binary data, audio, images, video
• data is content of resource identified
by URL
• interpretation data determined by
header fields:
WWW

• Hypertext & Hypermedia


• Browser Architecture
• Categories of Web Documents
• HTML
• CGI
• Java
Network Security

• Security Requirements
• confidentiality - protect data
content/access
• integrity - protect data accuracy
• availability - ensure timely service
• authenticity - protect data origin
Passive Attacks

• eavesdropping on transmissions
• to obtain information
– release of possibly sensitive/confidential
message contents
– traffic analysis which monitors
frequency and length of messages to
get info on senders
• difficult to detect
• can be prevented using encryption
Active Attacks

• masquerade
– pretending to be a different entity
• replay
• modification of messages
• denial of service
• easy to detect
– detection may lead to deterrent
• hard to prevent

Requirements for Security

• strong encryption algorithm


– even known, unable to decrypt without
key
– even if many plaintexts & ciphertexts
available
• sender and receiver must obtain
secret key securely
• once key is known, all
communication using this key is
type of
encryption/decryption
method
• Conventional Methods:
• Character-Level Encryption:
Substitutional & Transpositional
• Bit-Level Encryption:
Encoding/Decoding, Permutation,
Substitution, Product,
• Exclusive-Or & Rotation
• Public key Methods
Cryptography :RSA Security

• brute force search of all keys


– given size of parameters is infeasible
– but larger keys do slow calculations
• factor n to recover p & q
– a hard problem
– well known 129 digit challenge broken in
1994
– key size of 1024-bits (300 digits)
currently secure for most apps
• TEXT BOOKS
• Behrouz A. Foruzan, “Data communication and
Networking”, Tata McGraw-Hill, 2004.
• REFERENCES
• James .F. Kurouse & W. Rouse, “Computer
Networking: A Topdown Approach Featuring”,
Pearson Education.
• Larry L.Peterson & Peter S. Davie, “COMPUTER
NETWORKS”, Harcourt Asia Pvt. Ltd., Second
Edition.
• Andrew S. Tannenbaum, “Computer
Networks”, PHI, Fourth Edition, 2003.
• William Stallings, “Data and Computer
Communication”, Sixth Edition, Pearson

You might also like