Local and Wide Area Networks: 5.1. LAN Topologies (Bus, Ring, Star)
Local and Wide Area Networks: 5.1. LAN Topologies (Bus, Ring, Star)
If the channel is busy, the station waits until the channel becomes idle
Otherwise, the station waits for a back off period which is generally a
function of the number of collisions and restart main algorithm.
FAST ETHERNET
The Fast Ethernet standard (IEEE 802.3u) has been established for
Ethernet networks that need higher transmission speeds.
This standard raises the Ethernet speed limit from 10 Mbps-100 Mbps
with only minimal changes to the existing cable structure.
10 Gigabit Ethernet
10 Gigabit Ethernet is the fastest and most recent of the Ethernet
standards.
The IEEE 802.5 Token Ring technology provides for data transfer
rates of either 4 or 16 megabits per second.
Very briefly, here is how it works:
Empty information frames are continuously circulated on the ring.
When the frame gets back to the originator, it sees that the token has
been changed to 0 and that the message has been copied and received.
It removes the message from the frame.
The frame continues to circulate as an "empty“ frame, ready to be
taken by a workstation when it has a message to send.
Benefits of Token Ring Topology
Packet collision is reduced and the flow of data is managed in only
one direction.
As the topology is uni-directional, the data i.e. token should pass the
entire network – it should cross through all the nodes.
Multimode.
• The transmission will travel around the ring until it is received by the
station which originally sent it, which removes it from the ring.
Preamble (16 bits)- Gives a unique sequence that prepares each station for an
upcoming frame.
Frame control (8 bits)- Indicates the size of the address fields and whether the
frame contains asynchronous or synchronous data, among other control information.
Source address (48 bits) - Identifies the single station that sent the frame. As with
Ethernet and Token Ring addresses, FDDI source addresses are 6 bytes long.
Data - Contains either information destined for an upper-layer protocol or control
information.
Frame check sequence (FCS) (32 bits)- - Is filed by the source station with a
calculated cyclic redundancy check value dependent on frame contents. The
destination address recalculates the value to determine whether the frame was
damaged in transit. If so, the frame is discarded.
End delimiter (16 bits)- - Contains unique symbols; cannot be data symbols that
indicate the end of the frame.
Frame status (16 bits)- - Allows the source station to determine whether an error
occurred; identifies whether the frame was recognized and copied by a receiving
station.
The physical layer defines the electrical, mechanical, and logical characteristics for
transmitting bits across the physical medium. Examples of physical media include
twisted pair, coaxial, and fiber optic cable. Dual ring FDDI specifies fiber optic
cable as the physical medium.
The data link layer specifies the way a node accesses the underlying physical
medium and how it formats data for transmission. FDDI specifies formatting data
into frames, using a special set of symbols and following a special set of rules. The
MAC sublayer within the data link layer specifies the physical address (MAC
address) used for uniquely identifying FDDI nodes
5.3 Large networks /wide areas
WAN is a network that covers a broad area i.e., any
telecommunications network that links across metropolitan, regional,
or national boundaries using private or public network transports.
• Point-to-Point technologies
• Circuit-switched technologies
• Packet-switched technologies
Point-to-Point technologies
This digital signal rate, known as DS0, makes up the base digital unit
of the telephone system
Each analog voice call gets converted into a DS0 signal at the central
office of the PSTN(Public Switched telephone Network)
The DS0 rate also forms the basis for T-carrier, E-carrier, SONET or
SDH.
Carrier Channels Maximum
Throughpu
t
T1 24 1.544Mbps
E1 32 2.048Mbps
A method used by the old traditional telephone call-carried over the public switched
telephone network(PSTN)
When you are making circuit-switching, you are actually renting the lines. That is
why international calling/ long distance phone calls was expensive.
• Dial-up
• ISDN (Integrated service for Digital Network)
Packet-Switched technologies
Packet-Switched technologies share a common infrastructure between
all the provider’s subscribers.
Conventional or single key encryption - a simple algorithm is used to transform the text
substitution cipher - each letter of the alphabet is substituted with a different letter or symbol.
Cesar's method - replace every letter in the alphabet with the letter 3 away
A->D
B->E
C->F
...
X->A
Y->B
Z->C
Encryption And Decryption
How does the receiver decode the message? The sender needs
to send the key to the receiver.
How can this be done securely so that no one else can decode
the message?
To secure e-commerce transactions on the Web, the buyer’s
machine must encrypt the data before it sends it over the
Internet to the merchant’s Web server
Encryption And Decryption
•Symmetric/ Private Key Encryption
– Uses a single number key to encode and decode the data. Both
the sender and receiver must know the key
– DES (Data Encryption Standard) is the most widely used
standard for symmetric encryption
– Because each sender and receiver would require a different key,
this type of encryption is basically used by government entities
– It is rarely used for e-commerce transactions over the Internet
– Requires a secure way to get the key to both parties
Asymmetric / Public Key Encryption
Uses two numeric keys
The public key is available to anyone wishing to communicate securely
with the key’s owner
The private key is available only to the owner
Both keys are able to encrypt and decrypt each other’s messages
It is computationally infeasible to deduce the private key from the
public key. Anyone who has a public key can encrypt information but
cannot decrypt it. Only the person who has the corresponding private
key can decrypt the information.
Example: encode by raising to 5th power and moding result with 91
Decode by raising to 29th power mod 91
325= 2 (mod 91) and 229=32 (mod 91)
What Is a Firewall?
• A firewall is a system that enforces an access control policy between two networks-
such as your private LAN and the unsafe, public Internet.
• The firewall determines which inside services can be accessed from the outside, and
vice versa.
• The actual means by which this is accomplished varies widely, but in principle, the
firewall can be thought of as a pair of mechanisms: one to block traffic, one to
permit traffic
• A firewall is more than the locked front door to your network— it’s your security
guard as well.
Firewalls are also important because they provide a single “choke point” where
security and audits can be imposed.
A firewall can provide a network administrator with data about what kinds and amount of
traffic passed through it, how many attempts were made to break into it, and so on.
Like a closed circuit security TV system, your firewall not only prevents access, but also
monitors who’s been sniffing around, and assists in identifying those who attempt to breach
your security.
Basic Purpose of a Firewall
Screening Levels
• A firewall can screen both incoming and outgoing traffic. Because incoming traffic
poses a greater threat to the network, it’s usually screened more closely than
outgoing traffic.
• When you are looking at firewall hardware or software products, you’ll probably
hear about three types of screening that firewalls perform:
1. Screening that blocks any incoming data not specifically ordered by a user on
the network
2. Screening by the address of the sender
3. Screening by the contents of the communication
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol that is designed to
provide both security and data integrity for communications over a reliable transport
protocol such as Transport Control Protocol (TCP).