0% found this document useful (0 votes)
3 views

Communication Networks

Communication networks course

Uploaded by

Halla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Communication Networks

Communication networks course

Uploaded by

Halla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

1.

Data Communication: The transport of digital data between computers, addressing how
communication protocols enable reliable and efficient data transfer.

2. Networking Principles: Types of communication, including unicast, multicast, and broadcast, as


well as transmission principles (serial vs. parallel).

3. Multiplexing: Combining multiple data channels into one and separating them later.

4. Classification of Networks: Based on distance, such as LAN, MAN, WAN, and PAN, along with
the roles of switches and routers.

5. Internet Evolution and Protocols: From ARPANET to TCP/IP standards, and the roles of
organizations like ISO, ITU, and IETF in standardization.

1. Data Communication:

o Data communication involves processing and transporting digital data across


connections between computers, generally over large distances. It focuses on how to
establish reliable and efficient transfer mechanisms for exchanging data.

o Key aspects include how computers are connected, the types of media used for data
transport, and how digital data is represented on the medium. Communication
protocols play a critical role in this process.

2. Communication Protocols:

o Protocols are responsible for ensuring that data transfer happens in a uniform manner.
They define the design of data units and ensure that the transfer between computers is
both reliable and efficient.

3. Networking Principles:

o The document discusses different types of communication:

 Unicast: A point-to-point connection between two communication peers.

 Multicast: One sender communicates with several known receivers.

 Broadcast: One sender transmits data to all other peers, often with some peers
being unknown.

 Anycast and Geocast are also mentioned as newer or specialized


communication methods.

4. Transmission Principles:

o Data can be transmitted in two ways:

 Serial Transmission: Data is sent one bit at a time over a single channel.

 Parallel Transmission: Multiple bits are sent simultaneously over multiple


channels.
o The properties of transmission can vary, such as simplex (one-way communication),
half-duplex (two-way but not simultaneous), and full-duplex (two-way simultaneous).

5. Multiplexing:

o Multiplexing is the process of combining multiple data channels into a single channel at
the source, while demultiplexing is separating them at the destination. This concept is
crucial for efficiently utilizing the communication channel and can be applied at any
layer of the OSI model.

6. Classification of Networks:

o Networks are classified based on the distance they cover:

 Local Area Network (LAN): Covers a limited geographical area like a building,
with transmission speeds up to 1000 Mbps and simple topologies like bus, star,
ring, tree, or mesh.

 Metropolitan Area Network (MAN): Designed for larger areas like towns,
typically using similar technologies to LAN.

 Wide Area Network (WAN): Covers large distances and connects LANs and
MANs through complex topologies, often using routers and point-to-point
connections.

 Personal Area Network (PAN): Covers very short distances, like a few meters.

7. Internet Evolution:

o The Internet evolved from ARPANET, which was the first operational packet-switched
network. The need for standardized communication across different systems led to the
development of TCP/IP protocols, which are now the backbone of the Internet.

8. Quality and Performance:

o Network performance is evaluated based on several criteria:

 Delay: The time taken for data to travel from source to destination.

 Jitter: Variability in packet arrival time.

 Throughput: The amount of data successfully transmitted over a network.

 Reliability: Ensuring the network operates with fault tolerance and stability.

 Security: Protecting data from eavesdropping, tampering, and unauthorized


access.

9. Standardization:

o Several organizations are responsible for standardizing communication protocols to


ensure interoperability:
 ISO (International Organization for Standardization): Established the OSI
reference model and works on a wide range of communication standards.

 ITU (International Telecommunication Union): Oversees global communication


technologies, including radio and standardization.

 IETF (Internet Engineering Task Force): Focuses on the evolution of Internet


architecture and protocols like TCP/IP.

 IEEE: Develops standards for local area networks, such as the IEEE 802 family
(e.g., Ethernet, Wi-Fi).

1. Types of Transmission Media:

o Guided Media: Uses a physical path such as wires or optical fibers.

 Twisted Pair: Consists of two insulated copper wires twisted together to reduce
electromagnetic interference. Categories include Cat 3, Cat 5, Cat 6, and Cat 7,
each supporting higher bandwidth and longer distances.

 Coaxial Cable: Contains an insulated core conductor and a braided outer


conductor. It supports higher data rates (up to 1-2 Gbps over 1 km) and better
shielding.

 Optical Fiber: Transmits data as light pulses. It offers nearly unlimited data rates
(up to 50,000 Gbps), is insensitive to electromagnetic disturbances, and has a
very low bit error rate (~10⁻¹²).

2. Unguided Media:

o Wireless Transmission: Includes terrestrial and satellite communication. Signals are


transmitted through electromagnetic waves and can achieve data rates from 10 kbps to
1 Gbps depending on the frequency range and environment.

 Microwave Transmission: Used for long-distance, point-to-point


communication, with frequencies between 1-40 GHz.

 Satellite Communication: Utilizes satellites in geostationary orbit to relay


signals over vast distances. Common uses include television broadcasting, GPS,
and long-distance telephony.

3. Design Factors:

o Bandwidth directly affects data rates: Higher bandwidth leads to higher data rates.

o Transmission impairments like attenuation and interference can reduce signal quality.

o The number of receivers in guided media can increase attenuation.

4. Optical Transmission:
o Single-mode Fiber: A thin core (8-10 µm) prevents dispersion, making it ideal for long-
distance communication with minimal signal loss.

o Multi-mode Fiber: A thicker core (50 µm) allows multiple rays of light to propagate, but
it can suffer from dispersion, limiting its effective distance.

5. Wireless Propagation:

o Ground Wave: Follows the Earth's surface and is used for low-frequency communication
(up to 2 MHz).

o Sky Wave: Signal is reflected from the ionosphere, used in long-distance radio
communication.

o Line of Sight: Above 30 MHz, signals must travel in a straight path; they can extend
beyond visual range due to atmospheric refraction.

1. Transmission Media:

 The document begins by differentiating between guided and unguided media, emphasizing that
the characteristics of the medium and the signal define the quality of transmission.

o In unguided media, the bandwidth produced by the antenna is more critical.

o In guided media, the medium itself plays a more crucial role.

 The two key concerns in transmission media are data rate and distance.

2. Design Factors:

 Bandwidth: Higher bandwidth corresponds to higher data rates.

 Transmission Impairments: Factors like attenuation (signal loss over distance) and interference
can degrade the quality of the signal.

 Number of Receivers: In guided media, the more receivers connected to a transmission line, the
greater the attenuation.

3. Guided Transmission Media:

 Twisted Pair:

o Twisted pair cables transmit data using electrical signals. Electromagnetic interference is
a challenge, but twisting the wires helps reduce this interference.

o Categories:

 Cat 3: Supports 10Base-T networks, with a maximum spectral bandwidth of 16


MHz over 100 meters.

 Cat 5: Widely used for Ethernet (100Base-Tx) and ATM networks, with a
bandwidth of 100 MHz.
 Cat 6 and Cat 7: Offer much higher bandwidth (up to 625 MHz), supporting
Gigabit Ethernet and beyond.

o Unshielded Twisted Pair (UTP): No additional shielding, prone to interference.

o Shielded Twisted Pair (STP): Each pair of wires is shielded, providing better protection
from interference.

 Coaxial Cable:

o Coaxial cables are insulated copper cables that offer better shielding than twisted pair.
They are capable of higher data rates (1-2 Gbps) and can span longer distances (up to 1
km). However, they have largely been replaced by twisted pair in many networks.

o Bit Error Rate: Around 10⁻⁹, which indicates very reliable data transmission.

 Optical Fiber:

o Optical fiber offers the highest data rates, theoretically up to 50,000 Gbps, and is ideal
for long-distance transmission.

o The medium is insensitive to electromagnetic disturbances and provides excellent


signal-to-noise ratio.

o Bit Error Rate: Around 10⁻¹², making it extremely reliable for transmitting data over long
distances.

o Types of Optical Fiber:

 Single-Mode Fiber: Has a small core (8-10 µm), minimizing dispersion and
allowing for long-distance transmission.

 Multimode Fiber: Has a larger core (50 µm), supporting multiple light paths, but
suffers from higher dispersion.

4. Unguided Transmission Media:

 Wireless Transmission:

o Electromagnetic waves (frequencies ranging from 10 kHz to 300 GHz) are used for
wireless communication.

o Data rates range from 10 kbps to 1 Gbps depending on the technology.

 Microwave Transmission:

o Terrestrial Microwave: Used for long-distance communication, typically requiring line-


of-sight transmission. Frequencies range from 1-40 GHz, with higher frequencies
providing higher data rates.

o Satellite Microwave: Satellites act as relay stations, receiving and transmitting signals
over large distances. Common frequencies are in the 5.925-6.425 GHz range for uplinks
and 3.7-4.2 GHz for downlinks.
o Uses include television broadcasts, GPS, and long-distance telephony.

 Broadcast Radio:

o Radio frequencies (30 MHz - 1 GHz) are used for omnidirectional broadcast, commonly
used in FM radio and TV broadcasting. The signals require a line of sight and are subject
to multipath interference.

 Infrared:

o Infrared transmission uses modulated noncoherent infrared light. It requires line of sight
and is blocked by walls. Typical applications include TV remote controls and IRD ports.

5. Wireless Propagation:

 Signals travel via three primary routes:

o Ground Wave: Follows the contour of the earth and is used for AM radio (up to 2 MHz).

o Sky Wave: Signals are reflected or refracted by the ionosphere, making it possible to
transmit over long distances. Commonly used in amateur radio and international
broadcasts (BBC World Service, Voice of America).

o Line of Sight: Used for higher frequencies (above 30 MHz) and requires clear paths
between transmitter and receiver. Refraction allows the signal to travel beyond the
visual line of sight.

6. Transmission Impairments:

 Attenuation: Signal loss over distance is a critical factor in both wired and wireless transmission.
For example, optical fibers experience weakening due to absorption and dispersion, which can
be mitigated by using higher-quality materials and light sources.

7. Other Types of Wireless Communication:

 Satellite Communication: Satellites orbiting the earth relay communication signals, enabling
long-distance communication. These signals require geostationary orbits and are typically
spaced at least 3-4° apart to avoid interference.

o Uses include global positioning, television, and private business networks.

Based on the content from the document 04-ccn.pdf, here’s a detailed overview of the OSI and TCP/IP
Models for Computer Communication and Networking:

OSI Model:

The Open Systems Interconnection (OSI) model was developed by the International Organization for
Standardization (ISO). It serves as a theoretical framework to standardize the functions of a
telecommunication or computing system without focusing on its internal structure.

Seven Layers of the OSI Model:


1. Physical Layer:

o Concerned with the physical interface between the computer and the network.

o Manages aspects such as:

 Characteristics of the transmission medium.

 Signal levels and data rates.

 Other related physical layer matters like connectors and electrical signals.

2. Data Link Layer:

o Responsible for the transfer of data between two systems over a physical link.

o Handles error detection, flow control, and framing.

3. Network Layer:

o Manages routing of data packets between different networks.

o Handles logical addressing (like IP addressing) and path determination.

4. Transport Layer:

o Ensures the reliable delivery of data packets.

o Provides error recovery and data flow control.

o Common protocols: TCP (Transmission Control Protocol) for reliable communication


and UDP (User Datagram Protocol) for connectionless communication.

5. Session Layer:

o Establishes, maintains, and terminates communication sessions between applications.

o Ensures proper synchronization of data exchange.

6. Presentation Layer:

o Responsible for translating, encrypting, and compressing data.

o Ensures that data sent from the application layer of one system can be properly
interpreted by the application layer of another system.

7. Application Layer:

o Provides support for various network applications like email, file transfers, and remote
access.

o Examples of protocols: HTTP, FTP, SMTP.

TCP/IP Model:
The TCP/IP (Transmission Control Protocol/Internet Protocol) model is a practical, widely used
framework that forms the basis for the Internet. It was developed by the US Defense Advanced
Research Project Agency (DARPA) for the ARPANET packet-switched network. It is used globally as the
protocol suite for the Internet.

Layers of the TCP/IP Model:

1. Host-to-Network Layer (equivalent to the OSI’s Physical and Data Link Layers):

o Handles the exchange of data between a device and the network it is connected to.

o Concerns include the physical connection and low-level addressing.

2. Internet Layer:

o Corresponds to the OSI’s Network Layer.

o Uses the IP (Internet Protocol) to route packets across multiple networks.

o Handles logical addressing and routing through routers.

3. Transport Layer:

o Ensures reliable data transfer between hosts.

o Uses protocols like TCP (for reliable, connection-oriented communication) and UDP (for
fast, connectionless communication).

4. Application Layer:

o Similar to the OSI’s Application, Presentation, and Session Layers combined.

o Provides support for user applications and communication services like SMTP (Simple
Mail Transfer Protocol), FTP (File Transfer Protocol), and Telnet.

Comparison: OSI vs. TCP/IP:

1. Development:

o OSI is a theoretical model developed by the ISO.

o TCP/IP was developed by DARPA and is a practical model that serves as the foundation
for the Internet.

2. Layers:

o OSI has seven layers, each with specific functionalities.

o TCP/IP has four layers, where the Application Layer encompasses the functions of OSI's
Application, Presentation, and Session layers.

3. Usage:
o TCP/IP is the de facto standard for modern networking.

o OSI is a theoretical system that came after TCP/IP and is primarily used as a teaching
tool and reference model.

Protocols are a set of rules and conventions that define how data is transmitted and received across a
network. They ensure that devices, such as computers, routers, and other networked systems, can
communicate with each other effectively, regardless of differences in hardware, software, or
geographical location.

Key Features of Protocols:

1. Syntax: The structure or format of the data (e.g., how headers are added to data packets).

2. Semantics: The meaning of each section of bits (e.g., what specific fields in a packet represent).

3. Timing: Rules about when data should be sent and how fast.

Types of Protocols:

There are various types of protocols that serve different functions in a network. Some of the most
common include:

1. HTTP (HyperText Transfer Protocol): Used for transmitting web pages over the internet.

2. FTP (File Transfer Protocol): Used for transferring files between computers on a network.

3. TCP (Transmission Control Protocol): Ensures reliable, ordered delivery of data between
devices.

4. UDP (User Datagram Protocol): Allows faster, connectionless communication but with less
reliability.

5. IP (Internet Protocol): Responsible for routing data across networks using IP addresses.

6. SMTP (Simple Mail Transfer Protocol): Used for sending emails.

7. DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses to devices automatically.

8. DNS (Domain Name System): Translates domain names into IP addresses.

Purpose of Protocols:

 Standardization: Protocols standardize communication so that devices from different


manufacturers can interact.

 Error Handling: Many protocols include mechanisms to detect and correct transmission errors.

 Security: Some protocols, like SSL/TLS, include encryption to secure data during transmission.

 Efficiency: Protocols help manage network traffic efficiently by determining packet size,
addressing methods, and routing mechanisms.
Protocols are a set of rules and conventions that define how data is transmitted and received across a
network. They ensure that devices, such as computers, routers, and other networked systems, can
communicate with each other effectively, regardless of differences in hardware, software, or
geographical location.

Key Features of Protocols:

1. Syntax: The structure or format of the data (e.g., how headers are added to data packets).

2. Semantics: The meaning of each section of bits (e.g., what specific fields in a packet represent).

3. Timing: Rules about when data should be sent and how fast.

Types of Protocols:

There are various types of protocols that serve different functions in a network. Some of the most
common include:

1. HTTP (HyperText Transfer Protocol):

o Function: Used for transmitting web pages over the internet.

o Usage: Whenever you access a website, your browser uses HTTP to request data from
the web server, which then sends the content back to your browser for display.

2. FTP (File Transfer Protocol):

o Function: Enables the transfer of files between client and server on a network.

o Usage: Often used for uploading or downloading files between a local computer and a
remote server. It is commonly employed in web development when updating website
files or sharing large files.

3. TCP (Transmission Control Protocol):

o Function: Ensures reliable, ordered delivery of data between devices.

o Usage: TCP is used in applications where accurate data transmission is crucial, such as
web browsing, file transfers, and emails. It establishes a connection, checks for errors,
and ensures data is delivered in the correct order.

4. UDP (User Datagram Protocol):

o Function: Allows faster, connectionless communication but with less reliability.

o Usage: Commonly used for real-time applications where speed is more important than
reliability, such as video streaming, online gaming, and voice-over IP (VoIP) calls.

5. File Transfer Protocol (FTP):

o Function: Enables the transfer of files between client and server on a network.
o Usage: Used in various network environments where large files need to be uploaded or
downloaded, especially for backup solutions or exchanging data between different
systems.

6. Dynamic Host Configuration Protocol (DHCP):

o Function: Automatically assigns IP addresses to devices on a network.

o Usage: Most commonly used in office and home networks to automatically configure IP
addresses for devices such as computers, smartphones, or printers, allowing them to
communicate on the network without manual configuration.

7. Domain Name System (DNS):

o Function: Translates human-readable domain names (e.g., www.example.com) into IP


addresses.

o Usage: Whenever a user types a website URL into a browser, DNS is used to resolve the
domain name to the corresponding IP address so the browser can connect to the web
server hosting that site.

8. IP (Internet Protocol):

o Function: Responsible for routing data across networks using IP addresses.

o Usage: The core protocol that directs data from one device to another by identifying
each device with an IP address. It is used in every activity on the internet, such as web
browsing, sending emails, and file transfers.

9. SMTP (Simple Mail Transfer Protocol):

o Function: Used for sending emails.

o Usage: When you send an email, SMTP is responsible for routing that message from
your email client (like Outlook or Gmail) to the recipient's email server. It's the backbone
of email transmission.

10. SSL/TLS (Secure Sockets Layer/Transport Layer Security):

 Function: Provides encryption and secure data transmission.

 Usage: Used by websites to secure data exchange, particularly during online transactions, login
processes, or when sending sensitive information. Websites using HTTPS (the secure version of
HTTP) rely on SSL/TLS for encryption.

Purpose of Protocols:

1. Standardization: Protocols standardize communication so that devices from different


manufacturers can interact. For example, different brands of routers and computers can
communicate efficiently using the same networking protocols (such as TCP/IP).
2. Error Handling: Many protocols include mechanisms to detect and correct transmission errors.
TCP, for instance, ensures that packets are delivered in order and retransmits any lost or
corrupted packets.

3. Security: Some protocols, like SSL/TLS, include encryption to secure data during transmission.
For instance, when conducting online banking, your information is encrypted to prevent
unauthorized access.

4. Efficiency: Protocols help manage network traffic efficiently by determining packet size,
addressing methods, and routing mechanisms. IP, for example, ensures that data packets are
delivered to the correct destination using the shortest possible route.

Here’s a detailed explanation based on the document you provided about Modulation and Multiplexing
in the context of Computer Communication & Networking (CCN):

Modulation:

Modulation is the technique where an information signal is used to modify a carrier signal. This allows
the information to be transmitted over longer distances and ensures more efficient use of the
communication medium.

 Purpose:

o Information signals (like audio or data) are typically low power and cannot be
transmitted over long distances by themselves.

o Modulation allows the information signal to "ride" on a high-power carrier signal,


making long-distance communication possible.

o It also enables the use of smaller antennas since high-frequency signals radiate more
efficiently from smaller antennas.

Types of Modulation:

1. Amplitude Modulation (AM):

o In AM, the amplitude of the carrier signal is modified according to the information
signal.

o The required bandwidth is twice the bandwidth of the modulating signal. Since the
spectrum is symmetric around the carrier frequency, one side can be discarded to save
bandwidth.

o Usage: AM is used in broadcasting, particularly in AM radio.

2. Frequency Modulation (FM):

o Here, the frequency of the carrier signal changes in relation to the information signal.

o FM provides better resistance to noise and interference compared to AM, making it


ideal for high-quality audio transmission.
o Usage: FM is commonly used in FM radio and television sound transmission.

3. Phase Modulation (PM):

o In PM, it’s the phase of the carrier signal that changes based on the information signal.
The phase shift results in changes in frequency as well, but they are proportional to the
derivative of the amplitude.

o PM typically requires more bandwidth compared to AM.

o Usage: PM is used in certain digital communication systems.

Why Modulation is Necessary:

1. Long-Distance Transmission: Modulation makes it easier to transmit signals over long distances
by using high-frequency carrier waves.

2. Efficient Use of Antennas: Without modulation, transmitting low-frequency signals would


require impractically large antennas.

3. Reduced Interference: Modulation allows multiple signals to be transmitted simultaneously on


different frequencies without interference.

Multiplexing:

Multiplexing is a technique used to combine multiple signals for transmission over a single
communication channel or medium. This optimizes bandwidth usage and allows several communication
streams to share the same transmission path.

 Purpose:

o As data traffic increases, multiplexing becomes essential to avoid the need for separate
physical links for each signal.

o Multiplexing reduces the cost of communication and makes efficient use of available
bandwidth.

Types of Multiplexing:

1. Frequency Division Multiplexing (FDM):

o FDM divides the available frequency spectrum into smaller frequency bands, each used
by a different signal.

o Each signal modulates a separate carrier frequency, and the combined signals are
transmitted together.

o Usage: FDM is used in analog communication systems such as radio and television
broadcasting and cable TV systems.

2. Time Division Multiplexing (TDM):


o In TDM, multiple signals share the same communication link, but each signal is assigned
a specific time slot. This way, the signals are transmitted one after another in time, but
appear to be simultaneous because of the rapid switching.

o There are two types of TDM:

 Synchronous TDM: Each signal is given a time slot even if no data is present.
This can lead to inefficiency if some time slots are unused.

 Statistical TDM: Time slots are dynamically assigned based on the data's
presence, which improves efficiency.

o Usage: TDM is used in digital telecommunication systems and many computer


networks.

3. Code Division Multiple Access (CDMA):

o CDMA is a multiplexing technique that assigns a unique code to each signal. All signals
are transmitted on the same frequency but are differentiated using their unique codes.

o This allows many signals to share the same bandwidth while minimizing interference.

o Usage: CDMA is widely used in mobile phone networks and wireless communication.

Why Multiplexing is Necessary:

1. Cost Efficiency: Multiplexing reduces the number of physical links needed by allowing multiple
signals to share a single transmission path.

2. Bandwidth Utilization: By dividing the available bandwidth (whether in terms of frequency,


time, or code), multiplexing ensures that all available resources are used efficiently.

3. Scalability: As the demand for communication increases, multiplexing allows more signals to be
added without requiring additional transmission lines.

Transmission Impairments:

Transmission impairments occur in any communication system and degrade the quality of signals,
whether analog or digital. These impairments can result in the corruption or distortion of data during
transmission.

Types of Transmission Impairments:

1. Attenuation:

o Definition: Attenuation refers to the loss of signal strength as it travels through a


transmission medium.

o Cause: This loss depends on the medium, distance, and frequency of the signal.
o Effect: The received signal must be strong enough to be detected and should be
significantly higher than the noise to avoid errors.

o Solution:

 Signal strength can be increased using amplifiers or repeaters at regular


intervals.

 Equalization techniques like loading coils or amplifiers can help balance


attenuation across the frequency band.

o Measurement: Attenuation is measured in decibels (dB) using the formula:


dB=10log⁡10(P2P1)dB = 10 \log_{10} \left( \frac{P2}{P1} \right)dB=10log10(P1P2)
where P1 is the input signal power and P2 is the output signal power.

2. Delay Distortion:

o Definition: Delay distortion occurs when different frequency components of a signal


travel at different speeds, causing parts of the signal to arrive at different times.

o Cause: This impairment is only observed in guided media, such as cables, where the
propagation velocity varies with frequency.

o Effect: In digital signals, delay distortion can cause intersymbol interference, where one
bit spills over into another, leading to errors in data interpretation.

3. Noise:

o Definition: Noise refers to any unwanted or random signal that interferes with the
transmitted information.

o Cause: Noise can enter the communication system through the transmission medium or
can be generated internally by the communication equipment.

o Types of Noise:

 Thermal Noise: Also called white noise, it is caused by the random motion of
electrons in a conductor due to heat.

 Shot Noise: Results from fluctuations in electrical current.

 Excess Noise: Also known as flicker noise or pink noise, it is observed at low
frequencies.

o Effect: Noise corrupts the transmitted information, leading to errors in the received
data. The level of noise is crucial in determining the quality of the communication
system.

o Solution: Noise reduction techniques, such as filtering, error correction, and shielding,
can minimize its effect.
Signal-to-Noise Ratio (SNR):

 Definition: SNR is a measure of the strength of the signal relative to the noise in the system.

 Formula: SNR=PsignalPnoiseSNR = \frac{P_{\text{signal}}}{P_{\text{noise}}}SNR=PnoisePsignal


where P_signal is the power of the signal and P_noise is the power of the noise. SNR is often
expressed in decibels (dB).

 Effect: A higher SNR indicates a better quality signal with less noise. Conversely, a lower SNR
means the signal is heavily affected by noise.

Network Security:

Network security involves safeguarding data and resources in a network from unauthorized access,
misuse, or malicious attacks. It encompasses various services and mechanisms to ensure the
confidentiality, integrity, availability, and authenticity of data.

Security Requirements:

Network security provides five core services:

1. Confidentiality:

o Ensures that only authorized parties can access or disclose data.

o Protects personal privacy and proprietary information from unauthorized access.

2. Integrity:

o Ensures that data cannot be modified by unauthorized individuals.

o Protects against unauthorized alterations, including writing, deleting, or creating data.

3. Availability:

o Ensures timely and reliable access to data and services.

o Prevents disruptions that would deny service to authorized users.

4. Authenticity:

o Verifies the identity of users or systems to ensure that the data comes from a legitimate
source.

5. Accountability:

o Requires that the actions of entities in the network can be traced uniquely to ensure
responsibility for actions such as non-repudiation and intrusion detection.

Types of Security Attacks:

Security attacks can be classified into two broad categories:


1. Passive Attacks:

o These attacks involve eavesdropping on or monitoring transmissions without altering


the data.

o Examples:

 Eavesdropping: Intercepting sensitive information without detection.

 Traffic Analysis: Monitoring the frequency and length of messages to gather


intelligence about the communication system.

o Prevention: Can be mitigated by encryption, but they are difficult to detect since they
don't modify the data.

2. Active Attacks:

o These involve tampering with data or disrupting communication.

o Examples:

 Masquerade: Pretending to be another entity to gain unauthorized access.

 Replay: Re-transmitting valid data or messages to cause harm or bypass


security.

 Modification: Altering legitimate messages in transmission.

 Denial of Service (DoS): Overloading a system or network to disrupt services for


legitimate users.

o Detection and Recovery: Unlike passive attacks, active attacks can be detected, and
efforts focus on both detection and recovery, though prevention is more challenging.

Encryption Methods:

Encryption is one of the fundamental techniques to safeguard network data and ensure confidentiality.

1. Symmetric Encryption:

o Mechanism: Both the sender and receiver use the same secret key for encryption and
decryption.

o Challenges: Securely sharing and distributing the secret key between parties.

o Attacks:

 Cryptanalysis: Using knowledge of the algorithm and the plaintext/ciphertext to


deduce the key.

 Brute Force: Attempting every possible key to decrypt the data. Longer key sizes
make brute force attacks infeasible.
o Common Algorithms:

 Data Encryption Standard (DES): Uses 56-bit keys and 64-bit blocks, but it has
been broken due to its small key size.

 Advanced Encryption Standard (AES): Uses 128, 192, or 256-bit keys and 128-
bit blocks. It is more secure and efficient than DES.

2. Public Key Encryption:

o Mechanism: Involves two keys—a public key (for encryption) and a private key (for
decryption). The public key can be shared openly, while the private key is kept secret.

o Operation:

 A sender encrypts data using the recipient’s public key.

 The recipient decrypts the message using their private key.

o Advantage: No need to share a secret key between parties.

o Application: Used in digital signatures and secure communication.

Message Authentication:

Authentication ensures that messages come from legitimate sources and haven’t been tampered with
during transmission.

1. Message Authentication Code (MAC):

o A MAC is a short piece of information used to authenticate a message. It ensures both


the authenticity and integrity of the message.

o The MAC is generated by applying a secret key to the message, ensuring only the
intended receiver can verify the authenticity.

2. Digital Signatures:

o A digital signature authenticates the origin of a message and ensures the integrity of the
data.

o Operation:

 The sender encrypts a hash of the message with their private key.

 The recipient decrypts the hash using the sender’s public key to verify the
message's authenticity.

o Unlike encryption, digital signatures don't provide confidentiality but ensure


authenticity and integrity.
Link Encryption vs. End-to-End Encryption:

 Link Encryption:

o Encrypts all data along the communication links between devices, including headers and
metadata.

o Requires encryption/decryption at every switch, making it vulnerable at each point


where decryption occurs.

 End-to-End Encryption:

o Encrypts the data only at the source and decrypts it at the final destination.

o Provides higher security, but does not protect the headers or routing information.

Solution: A combination of both link and end-to-end encryption is often used to maximize security.

Key Distribution:

For symmetric encryption, securely distributing the secret key is crucial. Possible methods include:

1. Direct Distribution: One party selects the key and securely delivers it to the other party.

2. Third-Party Distribution: A trusted third party generates the key and securely delivers it to both
parties.

3. Key Transmission: Using an existing key to securely transmit a new key.

You might also like