0% found this document useful (0 votes)
6 views

UGC NET COMPUTER SCIENCE

Uploaded by

Aneesh Shinde
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

UGC NET COMPUTER SCIENCE

Uploaded by

Aneesh Shinde
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 39

1.

Data Communication
1. Components of a Data Communication System

A data communication system consists of essential elements that enable the exchange of data between devices.
These components include:

1. Message:

o The actual information to be transmitted.

o Examples: Text, images, audio, video, etc.

2. Sender:

o The device or entity that sends the data.

o Examples: Computers, smartphones, sensors.

3. Receiver:

o The device or entity that receives the data.

o Examples: Servers, desktops, other IoT devices.

4. Transmission Medium:

o The physical path or channel through which data travels.

o Examples: Copper wires, fiber optics, radio waves.

5. Protocol:

o A set of rules and conventions for data communication.

o Examples: HTTP (web browsing), FTP (file transfer), TCP/IP.

2. Modes of Communication

Simplex Mode:

 Data flows in one direction only.

 No return communication.

 Example: Keyboard to monitor communication.

 Advantages:

o Simple and cost-effective.

 Disadvantages:

o Lack of feedback or acknowledgment.

Half-Duplex Mode:

 Data flows in both directions, but only one direction at a time.

 Example: Walkie-talkies.

 Advantages:

o Efficient use of channel bandwidth compared to simplex.


 Disadvantages:

o Slower communication due to alternating transmission.

Full-Duplex Mode:

 Data flows in both directions simultaneously.

 Example: Telephone communication.

 Advantages:

o High efficiency and speed.

 Disadvantages:

o Requires more complex hardware.

3. Signals

Analog Signals:

 Continuous signals that vary over time.

 Represented by sine waves.

 Characteristics:

o Amplitude: Height of the wave.

o Frequency: Number of waves per second (measured in Hz).

o Phase: Position of the wave relative to time zero.

 Example: Human voice in the air.

Digital Signals:

 Discrete signals represented as binary values (0s and 1s).

 Characteristics:

o Square-shaped waves.

 Example: Data transmitted in computers.

4. Channel Characteristics

Noiseless Channels:

 Ideal channels with no interference or distortion.

 Often used as a theoretical model.

Noisy Channels:

 Real-world channels affected by interference, attenuation, and distortion.

 Types of noise:

o Thermal Noise: Random motion of electrons.

o Intermodulation Noise: Signals of different frequencies mix.


o Crosstalk: Signal leakage into adjacent channels.

5. Bandwidth, Throughput, and Latency

1. Bandwidth:

o The maximum data rate that a channel can carry.

o Measured in bits per second (bps).

o Types:

 Frequency Bandwidth: Difference between the highest and lowest frequencies of a


channel.

 Data Bandwidth: Maximum amount of data transmitted per unit of time.

2. Throughput:

o Actual data rate achieved in a network.

o Depends on factors like noise, interference, and network congestion.

3. Latency:

o Time delay in data transmission.

o Components:

 Propagation Delay: Time taken for data to travel through the medium.

 Transmission Delay: Time taken to push the data onto the wire.

 Queuing Delay: Time spent in queues due to congestion.

6. Digital and Analog Transmission

Digital Transmission:

 Transmitting digital signals directly as binary values (0s and 1s).

 Advantages:

o Noise immunity.

o Error detection and correction.

 Techniques:

o Non-Return-to-Zero (NRZ).

o Manchester Encoding.

Analog Transmission:

 Transmitting data by modulating analog signals.

 Techniques:

o Amplitude Modulation (AM): Varying amplitude.

o Frequency Modulation (FM): Varying frequency.


o Phase Modulation (PM): Varying phase.

7. Data Encoding and Modulation Techniques

Data Encoding:

 Conversion of data into signals suitable for transmission.

 Types:

o Digital-to-Digital Encoding: NRZ, Manchester.

o Analog-to-Digital Encoding: Pulse Code Modulation (PCM).

o Digital-to-Analog Encoding: ASK, FSK, PSK.

o Analog-to-Analog Encoding: AM, FM, PM.

Modulation Techniques:

 Altering properties of a carrier signal based on the data signal.

 Types:

o Amplitude Shift Keying (ASK): Modifies amplitude.

o Frequency Shift Keying (FSK): Modifies frequency.

o Phase Shift Keying (PSK): Modifies phase.

o Quadrature Amplitude Modulation (QAM): Combines ASK and PSK.

8. Broadband and Baseband Transmission

1. Baseband Transmission:

o Single signal transmitted over the channel.

o Entire bandwidth dedicated to one signal.

o Example: Ethernet.

2. Broadband Transmission:

o Multiple signals transmitted simultaneously using different frequencies.

o Example: Cable TV.

9. Multiplexing

 Combining multiple signals into one channel.

 Types:

1. Time Division Multiplexing (TDM):

 Divides time slots among signals.

2. Frequency Division Multiplexing (FDM):

 Assigns different frequencies to each signal.


3. Wavelength Division Multiplexing (WDM):

 Used in optical communication.

10. Transmission Media

1. Guided Media:

o Physical pathways for signal transmission.

o Types:

 Twisted Pair Cables: Low-cost, used in LANs.

 Coaxial Cables: High bandwidth, used in cable TV.

 Fiber Optics: High-speed, long-distance communication.

2. Unguided Media:

o Wireless transmission.

o Types:

 Radio Waves: Broadcast applications.

 Microwaves: Line-of-sight communication.

 Infrared: Short-range communication.

11. Transmission Errors

1. Causes of Errors:

o Noise.

o Signal attenuation.

o Hardware failures.

2. Types of Errors:

o Single-Bit Errors: One bit altered.

o Burst Errors: Multiple bits altered.

12. Error Handling Mechanisms

Error Detection:

1. Parity Check:

o Adds a parity bit to ensure an even or odd number of 1s.

2. Cyclic Redundancy Check (CRC):

o Uses polynomial division to detect errors.

3. Checksum:

o Sums all data segments and appends the result.


Error Correction:

1. Hamming Code:

o Adds redundant bits to correct single-bit errors.

2. Forward Error Correction (FEC):

o Corrects errors without retransmission.


2. Computer Networks
1. Network Topologies

Network topology refers to the arrangement of devices (nodes) and connections in a network.

Types of Topologies:

1. Bus Topology:

o A single central cable (backbone) connects all devices.

o Advantages:

 Simple and cost-effective.

 Easy to extend.

o Disadvantages:

 A single point of failure (backbone).

 Limited cable length and device connections.

2. Star Topology:

o All devices connect to a central hub or switch.

o Advantages:

 Easy to troubleshoot and add/remove devices.

 Centralized management.

o Disadvantages:

 Hub/switch failure affects the entire network.

 Higher cost due to additional hardware.

3. Ring Topology:

o Devices form a closed loop, with each connected to two others.

o Advantages:

 Equal access to the network.

 Suitable for token-based systems.

o Disadvantages:

 A single failure disrupts the entire network.

 Troubleshooting is complex.

4. Mesh Topology:

o Each device connects to every other device.

o Advantages:

 Highly reliable and fault-tolerant.

 Redundant paths ensure uninterrupted communication.


o Disadvantages:

 High cost and complexity.

 Requires more cabling and configuration.

5. Hybrid Topology:

o Combines two or more basic topologies.

o Advantages:

 Flexible and scalable.

 Tailored to specific needs.

o Disadvantages:

 Complex implementation and maintenance.

2. Local Area Networks (LANs)

 A LAN is a network confined to a small geographical area, such as an office or campus.

 Characteristics:

o High data transfer rates.

o Limited range (up to a few kilometers).

o Typically uses Ethernet and Wi-Fi.

 Advantages:

o Easy resource sharing (files, printers).

o Cost-effective for small areas.

 Disadvantages:

o Limited coverage.

o Security risks in shared environments.

3. Metropolitan Area Networks (MANs)

 A MAN covers a city or a large campus.

 Characteristics:

o Larger than LAN but smaller than WAN.

o Connects multiple LANs within a region.

o Uses technologies like fiber optics and microwave transmission.

 Advantages:

o Cost-effective for regional communication.

o High-speed connectivity across a city.

 Disadvantages:
o Higher implementation cost than LAN.

o Maintenance complexity.

4. Wide Area Networks (WANs)

 A WAN spans large geographical areas, such as countries or continents.

 Characteristics:

o Connects multiple LANs and MANs.

o Uses leased lines, satellite links, and the Internet.

o Protocols: MPLS, ATM, and Frame Relay.

 Advantages:

o Global communication and connectivity.

o Supports large-scale business operations.

 Disadvantages:

o High cost of infrastructure and maintenance.

o Slower data transfer compared to LANs and MANs.

5. Wireless Networks

 Wireless networks use radio waves, microwaves, or infrared signals for communication.

 Types of Wireless Networks:

1. Wireless Local Area Network (WLAN):

 Example: Wi-Fi.

 Provides wireless access within a small area.

2. Wireless Personal Area Network (WPAN):

 Example: Bluetooth, Zigbee.

 Covers a very small area, typically for personal devices.

3. Wireless Metropolitan Area Network (WMAN):

 Example: WiMAX.

 Provides wireless connectivity across a city.

4. Wireless Wide Area Network (WWAN):

 Example: Cellular networks (3G, 4G, 5G).

 Covers large geographical areas.

Advantages of Wireless Networks:

 No physical cables required.

 Easy installation and scalability.


 Supports mobility.

Disadvantages of Wireless Networks:

 Susceptible to interference and eavesdropping.

 Limited bandwidth compared to wired networks.

 Signal strength decreases with distance and obstacles.

6. Internet

 The Internet is a global network that interconnects millions of private, public, academic, and business
networks.

 Key Components:

1. IP Addressing:

 Every device on the Internet has a unique IP address.

 Versions:

 IPv4: 32-bit address (e.g., 192.168.1.1).

 IPv6: 128-bit address (e.g., 2001:0db8::1).

2. Domain Name System (DNS):

 Maps domain names (e.g., www.example.com) to IP addresses.

3. Internet Service Providers (ISPs):

 Companies that provide Internet access.

4. Protocols:

 HTTP/HTTPS: Web communication.

 FTP: File transfer.

 SMTP: Email delivery.

Advantages of the Internet:

 Global connectivity.

 Access to a vast amount of information and services.

 Facilitates communication (e.g., email, video conferencing).

Disadvantages of the Internet:

 Security and privacy risks.

 Dependence on Internet connectivity for critical operations.

 Exposure to malicious activities (e.g., hacking, phishing).


3. Network Models
1. Layered Architecture

 A layered architecture organizes the functions of a network into a hierarchy of layers.

 Purpose:

o Simplifies network design.

o Ensures interoperability between different vendors and systems.

o Provides modularity for easier troubleshooting and updates.

Key Features:

 Each layer performs specific tasks and communicates with adjacent layers using standardized interfaces.

 Data passes through each layer during transmission and reception.

2. OSI Reference Model

The OSI (Open Systems Interconnection) Model is a conceptual framework that standardizes network
communication.

7 Layers of the OSI Model:

1. Physical Layer:

o Deals with the transmission of raw bits over a physical medium.

o Includes cables, switches, and network interface cards.

o Functions:

 Bit synchronization.

 Physical connection establishment.

 Transmission of electrical or optical signals.

2. Data Link Layer:

o Responsible for reliable data transfer between adjacent nodes.

o Divided into two sublayers:

 Logical Link Control (LLC): Error detection and flow control.

 Media Access Control (MAC): Manages access to the physical medium.

o Functions:

 Framing.

 Error detection and correction (e.g., CRC).

3. Network Layer:

o Handles routing and addressing.

o Functions:

 Logical addressing (IP addresses).


 Path determination using routing algorithms.

 Packet forwarding and fragmentation.

4. Transport Layer:

o Ensures reliable data transfer between end devices.

o Functions:

 Segmentation and reassembly of data.

 Flow control (e.g., sliding window protocol).

 Error control.

o Protocols: TCP, UDP, SCTP.

5. Session Layer:

o Establishes, manages, and terminates sessions.

o Functions:

 Dialog control.

 Synchronization of data streams.

6. Presentation Layer:

o Ensures data is in a usable format for the application layer.

o Functions:

 Data translation (e.g., ASCII to Unicode).

 Encryption and compression.

7. Application Layer:

o Provides network services directly to users and applications.

o Protocols: HTTP, FTP, SMTP, DNS.

3. TCP/IP Protocol Suite

The TCP/IP (Transmission Control Protocol/Internet Protocol) Model is a practical framework widely used for the
Internet.

4 Layers of TCP/IP:

1. Network Interface Layer:

o Corresponds to OSI's Physical and Data Link layers.

o Handles the physical transmission of data.

2. Internet Layer:

o Corresponds to OSI's Network layer.

o Functions:

 Logical addressing (IPv4, IPv6).


 Packet routing (e.g., RIP, OSPF).

3. Transport Layer:

o Provides reliable or best-effort delivery.

o Protocols:

 TCP: Reliable, connection-oriented.

 UDP: Unreliable, connectionless.

4. Application Layer:

o Includes all protocols for application services.

o Examples: HTTP, FTP, Telnet, DNS.

Comparison of OSI and TCP/IP Models:

Feature OSI Model TCP/IP Model

Layers 7 4

Developed by ISO DoD

Protocol dependency Protocol-independent Protocol-specific

Usage Theoretical Practical

4. Physical, Logical, Port, and Specific Addresses

1. Physical Address (MAC Address):

 Unique hardware identifier for devices on a network.

 Assigned by the manufacturer (e.g., 48-bit hexadecimal format: 00:1A:2B:3C:4D:5E).

 Used in the Data Link layer.

2. Logical Address (IP Address):

 Network layer address for identifying devices on a network.

 Versions:

o IPv4: 32-bit address (e.g., 192.168.1.1).

o IPv6: 128-bit address (e.g., 2001:db8::1).

3. Port Address:

 Identifies specific processes or services on a device.

 16-bit numbers (e.g., 80 for HTTP, 443 for HTTPS).

 Types of Ports:

o Well-known ports: 0-1023.

o Registered ports: 1024-49151.

o Dynamic/private ports: 49152-65535.

4. Specific Address:
 Used for application-level addressing (e.g., URLs in DNS).

5. Switching Techniques

Switching is a method of forwarding data in a network.

Types of Switching:

1. Circuit Switching:

o Establishes a dedicated path between sender and receiver.

o Used in traditional telephone networks.

o Advantages:

 Reliable and consistent communication.

o Disadvantages:

 Inefficient use of resources.

2. Packet Switching:

o Data is divided into packets and sent independently.

o Used in the Internet.

o Advantages:

 Efficient and scalable.

o Disadvantages:

 Packets may arrive out of order.

3. Message Switching:

o Entire message is stored and forwarded.

o Rarely used due to latency issues.

4. Cell Switching:

o Data is divided into fixed-size cells.

o Example: ATM (Asynchronous Transfer Mode).


4. Functions of OSI and TCP/IP Layers:
1. Framing

 Definition: Framing is the process of encapsulating network data into frames for transmission at the Data
Link layer.

 Functions:

o Adds headers and trailers to data.

o Divides data streams into manageable units.

o Synchronizes sender and receiver for accurate data transmission.

 Techniques:

o Byte-oriented protocols (e.g., PPP).

o Bit-oriented protocols (e.g., HDLC).

2. Error Detection and Correction

 Ensures data integrity during transmission by identifying and correcting errors.

 Error Detection:

o Parity Check: Adds a parity bit to data.

o Cyclic Redundancy Check (CRC): Detects burst errors by appending a checksum.

o Checksum: Verifies integrity at the Transport layer (e.g., in TCP).

 Error Correction:

o Hamming Code: Detects and corrects single-bit errors.

o Forward Error Correction (FEC): Corrects errors without retransmission.

3. Flow Control

 Definition: Manages data flow between sender and receiver to prevent congestion or buffer overflow.

 Techniques:

o Stop-and-Wait Protocol: Sender waits for acknowledgment after each frame.

o Sliding Window Protocol: Allows multiple frames to be in transit before requiring


acknowledgment.

4. Sliding Window Protocol

 Definition: A flow control mechanism allowing multiple frames to be sent before acknowledgment.

 Features:

o Window Size: Determines the number of frames in transit.

o Improves efficiency over the Stop-and-Wait protocol.


 Variants:

o Go-Back-N ARQ: Retransmits all frames from the point of error.

o Selective Repeat ARQ: Retransmits only erroneous frames.

5. HDLC (High-Level Data Link Control)

 Definition: A bit-oriented protocol for reliable data transmission at the Data Link layer.

 Modes of Operation:

o Normal Response Mode (NRM): Master-slave communication.

o Asynchronous Balanced Mode (ABM): Peer-to-peer communication.

 Features:

o Framing.

o Error detection using CRC.

o Flow control.

6. Multiple Access Techniques

 Definition: Methods for multiple devices to share a communication medium.

1. CSMA/CD (Carrier Sense Multiple Access with Collision Detection):

 Used in Ethernet networks.

 Devices sense the medium before transmitting.

 Collisions are detected, and devices retransmit after random backoff.

2. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance):

 Used in wireless networks (e.g., Wi-Fi).

 Devices avoid collisions by waiting for a free medium and using acknowledgments.

3. Reservation:

 Resources are reserved in advance for communication.

 Example: TDMA in cellular networks.

4. Polling:

 A central device polls others to check readiness for transmission.

5. Token Passing:

 A token circulates in the network, granting transmission rights to devices.

6. FDMA (Frequency Division Multiple Access):

 Assigns different frequency bands to devices.

 Used in analog cellular networks.


7. CDMA (Code Division Multiple Access):

 Devices share the same frequency but use unique codes for separation.

8. TDMA (Time Division Multiple Access):

 Allocates distinct time slots to devices.

 Used in GSM networks.

7. Network Devices

 Switch: Operates at the Data Link layer, forwarding frames based on MAC addresses.

 Router: Operates at the Network layer, forwarding packets based on IP addresses.

 Gateway: Connects networks with different protocols.

 Access Point: Extends wireless network coverage.

8. Backbone Networks

 A high-capacity network connecting multiple sub-networks.

 Purpose:

o Provides centralized infrastructure for data exchange.

o Ensures efficient and fast communication.

9. Virtual LANs (VLANs)

 Definition: Logical grouping of devices into separate broadcast domains within the same physical network.

 Advantages:

o Improved security.

o Reduced broadcast traffic.

o Better network management.

IPv4 Structure and Address Space

1. IPv4 Addressing:

 Format: 32-bit address divided into four octets (e.g., 192.168.1.1).

 Classes:

o Class A: 1.0.0.0 to 126.0.0.0.

o Class B: 128.0.0.0 to 191.255.0.0.

o Class C: 192.0.0.0 to 223.255.255.0.

o Class D: Reserved for multicast.

o Class E: Reserved for experimental purposes.


2. Address Types:

 Unicast: One-to-one communication.

 Multicast: One-to-many communication.

 Broadcast: One-to-all communication.

3. Classful vs. Classless Addressing:

 Classful: Fixed network and host portions.

 Classless (CIDR): Allows variable-length subnet masks for efficient address utilization.

IPv6 Packet Format

 Definition: 128-bit address space for scalable addressing.

 Advantages:

o Larger address space.

o Simplified header format.

o Improved security and efficiency.

Mapping Logical to Physical Address (ARP)

 Definition: Resolves IP addresses to MAC addresses.

 Steps:

1. ARP request is broadcast to all devices.

2. The device with the matching IP sends an ARP reply.

Routing Algorithms

 Static Routing: Fixed paths configured manually.

 Dynamic Routing: Adapts to network changes using algorithms:

o Distance Vector: Determines routes based on hop count (e.g., RIP).

o Link State: Uses complete network topology (e.g., OSPF).

TCP, UDP, and SCTP Protocols

1. TCP (Transmission Control Protocol):

 Connection-oriented.

 Reliable, ordered delivery.

 Used in HTTP, FTP.


2. UDP (User Datagram Protocol):

 Connectionless.

 Faster but unreliable.

 Used in DNS, video streaming.

3. SCTP (Stream Control Transmission Protocol):

 Combines features of TCP and UDP.

 Supports multi-streaming and multi-homing.

Flow, Error, and Congestion Control

1. Flow Control:

 Prevents sender from overwhelming the receiver.

 Methods: Sliding Window Protocol.

2. Error Control:

 Ensures reliable delivery using acknowledgments and retransmissions.

3. Congestion Control:

 Manages network traffic to avoid congestion.

 TCP mechanisms:

o Slow Start.

o Congestion Avoidance.

o Fast Recovery.
6. World Wide Web (WWW)
1. Uniform Resource Locator (URL)

 Definition: A URL is the unique address used to access a resource on the World Wide Web.

 Structure:

1. Protocol: Specifies the communication protocol (e.g., http, https, ftp).


 Example: https://

2. Domain Name: Identifies the server hosting the resource (e.g., www.example.com).
3. Path: Specifies the exact location of the resource on the server.
 Example: /docs/index.html

4. Port (Optional): Specifies the communication port (default ports are 80 for HTTP and 443 for HTTPS).
5. Query String (Optional): Parameters passed to the server.
 Example: ?id=123

6. Fragment Identifier (Optional): Points to a specific section within a resource.


 Example: #section2

2. Domain Name System (DNS)

 Definition: DNS is a hierarchical naming system used to translate domain names into IP addresses and vice
versa.

 Components:

o Domain Name: Human-readable identifier (e.g., google.com).

o IP Address: Numeric identifier used by computers to communicate (e.g., 192.168.1.1).

 Hierarchy:

1. Root Domain: Represented by . (invisible in most URLs).

2. Top-Level Domain (TLD): Examples include .com, .org, .edu, .gov.

3. Second-Level Domain: Identifies a specific entity (e.g., example in example.com).

4. Subdomain: A subdivision under the main domain (e.g., mail.example.com).

Resolution - Mapping Names to Addresses and Addresses to Names

 Name to Address:

1. User enters a domain name (e.g., www.google.com).

2. DNS translates it into an IP address (e.g., 142.250.190.36).

 Address to Name:
o Reverse DNS lookup maps an IP address back to its domain name.

3. Electronic Mail (Email) Architecture

Architecture Overview:

 User Agents (UA): Applications like Gmail, Outlook used to compose, send, and read emails.

 Mail Servers: Store and forward emails between users.

 Protocols: Facilitate email transmission and retrieval.

4. Email Protocols

1. SMTP (Simple Mail Transfer Protocol):

 Purpose: Used to send emails from a client to a server or between servers.

 Features:

o Operates on port 25 (default) or 587 (secure).

o Does not handle email retrieval.

o Example: Sending an email via Gmail's outgoing server.

2. POP (Post Office Protocol):

 Purpose: Used to retrieve emails from a server to a local client.

 Features:

o Downloads emails to the client and usually deletes them from the server.

o Operates on port 110 (default) or 995 (secure).

o Example: Outlook fetching emails from a server.

3. IMAP (Internet Message Access Protocol):

 Purpose: Allows retrieval and management of emails while keeping them on the server.

 Features:

o Synchronizes emails across devices.

o Operates on port 143 (default) or 993 (secure).

o Example: Gmail accessed on multiple devices.

5. TELNET

 Definition: TELNET (Telecommunication Network) is a protocol for remote login and command execution.

 Features:

o Provides text-based communication with a remote computer.

o Operates on port 23.

o Sends data in plaintext (lacks security).


 Uses:

o Accessing remote servers.

o Managing devices (e.g., routers, switches).

6. FTP (File Transfer Protocol)

 Definition: FTP is used to transfer files between a client and a server over a network.

 Features:

o Operates on ports 20 (data) and 21 (control).

o Supports authentication using usernames and passwords.

 Modes:

o Active Mode: Server initiates the data connection.

o Passive Mode: Client initiates both control and data connections.

 Uses:

o Uploading and downloading files.

o Hosting and managing web files.


7. Network Security
1. Malwares
Definition:
Malware (malicious software) refers to software intentionally designed to harm, exploit, or otherwise
compromise systems, networks, or devices.
Types of Malware:
1. Virus:
o Attaches to files and programs.
o Requires user action to spread.
o Example: File-infecting viruses.
2. Worm:
o Self-replicating and spreads without user intervention.
o Example: WannaCry ransomware worm.
3. Trojan Horse:
o Disguises itself as legitimate software but executes malicious tasks.
o Example: Remote Access Trojan (RAT).
4. Ransomware:
o Encrypts data and demands payment for decryption.
o Example: Locky, CryptoLocker.
5. Spyware:
o Collects user information without consent.
o Example: Keyloggers.
6. Adware:
o Displays intrusive advertisements, often bundled with free software.
7. Rootkit:
o Provides unauthorized access while hiding its presence.
8. Botnet:
o Network of infected devices controlled remotely for malicious activities.
9. Phishing:
o Attempts to steal sensitive data through deceptive emails or websites.
2. Cryptography and Steganography
Cryptography:
 Definition: The practice of securing information through encoding, ensuring confidentiality,
integrity, and authenticity.
 Key Objectives:
1. Confidentiality: Ensures only authorized parties can read the data.
2. Integrity: Prevents unauthorized modification of data.
3. Authentication: Verifies sender/receiver identity.
4. Non-Repudiation: Prevents denial of action.
Steganography:
 Definition: The practice of hiding data within other files or media (e.g., images, videos).
 Purpose: Conceals the existence of information rather than encrypting it.
 Example: Embedding text in image pixels using Least Significant Bit (LSB) encoding.

3. Secret-Key Algorithms
Definition:
 Symmetric cryptographic algorithms where the same key is used for both encryption and
decryption.
 Faster but less secure for large-scale systems due to key distribution challenges.
Examples:
1. DES (Data Encryption Standard):
o 56-bit key; now considered insecure.
2. AES (Advanced Encryption Standard):
o Secure and widely used; key sizes of 128, 192, or 256 bits.
3. RC4:
o Stream cipher; used in wireless security (e.g., WEP, WPA).
4. Blowfish:
o Fast and secure; used in password storage.
4. Public-Key Algorithms
Definition:
 Asymmetric cryptographic algorithms using two keys: a public key (encryption) and a private key
(decryption).
 Enables secure communication over insecure channels.
Examples:
1. RSA (Rivest-Shamir-Adleman):
o Based on factoring large prime numbers.
o Used in SSL/TLS for secure web communication.
2. Diffie-Hellman:
o Key exchange protocol.
o Establishes a shared secret over an insecure channel.
3. ECC (Elliptic Curve Cryptography):
o Efficient and secure for small devices.

5. Digital Signature
Definition:
 A cryptographic mechanism to verify the authenticity and integrity of digital data.
 Combines public-key cryptography and hash functions.
Components:
1. Signing:
o Sender encrypts the hashed message using their private key.
2. Verification:
o Receiver decrypts the signature using the sender's public key and compares it with the
computed hash.
Applications:
 Authenticating emails (PGP, S/MIME).
 Securing software distribution.
 Verifying identity in e-commerce.

6. Virtual Private Networks (VPNs)


Definition:
 A secure, encrypted connection between two endpoints over a public network.
Key Features:
1. Encryption:
o Protects data during transmission.
2. Tunneling:
o Encapsulates data packets for secure transit.
3. Authentication:
o Ensures only authorized users access the network.
Types of VPNs:
1. Remote Access VPN:
o For individual users to access corporate networks remotely.
2. Site-to-Site VPN:
o Connects multiple networks securely.
Protocols:
1. IPSec: Secures IP traffic.
2. L2TP: Layer 2 Tunneling Protocol, often combined with IPSec.
3. OpenVPN: Open-source VPN protocol using SSL/TLS.

7. Firewalls
Definition:
 A network security device or software that monitors and controls incoming and outgoing traffic
based on predefined rules.
Types:
1. Packet-Filtering Firewalls:
o Inspects packets based on headers (IP, ports, protocols).
2. Stateful Firewalls:
o Tracks active connections and applies rules accordingly.
3. Proxy Firewalls:
o Intermediates between users and external networks.
4. Next-Generation Firewalls (NGFW):
o Incorporates advanced features like intrusion prevention and application-level inspection.
Functions:
1. Block unauthorized access.
2. Monitor and log network traffic.
3. Protect against DoS/DDoS attacks.
8. Mobile technology
1. GSM (Global System for Mobile Communications)

Definition:

GSM is a standard for mobile communication widely used for voice and data services.

Key Features:

1. Digital Communication: Uses Time Division Multiple Access (TDMA) for channel access.

2. Frequency Bands: Operates in 900 MHz, 1800 MHz, and 1900 MHz bands.

3. SIM (Subscriber Identity Module): Stores subscriber information.

4. Roaming: Allows connectivity across networks globally.

5. Encryption: Provides secure communication.

Architecture:

1. Mobile Station (MS):

o Includes the handset and SIM card.

2. Base Station Subsystem (BSS):

o Manages radio communication with mobile devices.

o Components:

 Base Transceiver Station (BTS): Handles radio transmission.

 Base Station Controller (BSC): Manages multiple BTS units.

3. Network Subsystem (NSS):

o Handles call switching and mobility.

o Components:

 Mobile Switching Center (MSC): Core network element for routing calls.

 Home Location Register (HLR): Stores permanent subscriber data.

 Visitor Location Register (VLR): Temporary data for roaming users.

 Authentication Center (AUC): Ensures secure access.

 Equipment Identity Register (EIR): Tracks device validity.

4. Operation and Support System (OSS):

o Monitors and manages network performance.

2. CDMA (Code Division Multiple Access)

Definition:

CDMA is a channel access method where multiple users share the same frequency band using unique codes.
Key Features:

1. Spread Spectrum Technology:

o Data is spread over a wide bandwidth.

2. Soft Handoff:

o Allows seamless transfer between base stations.

3. Efficient Spectrum Use:

o Supports more users compared to GSM.

4. No SIM Requirement:

o Subscriber information is embedded in the device.

Comparison: GSM vs. CDMA:

Feature GSM CDMA

Access Method TDMA + FDMA Spread Spectrum

SIM Card Required Not Required

Frequency Bands Standardized Flexible

Voice Quality Standard Superior

3. Services and Architecture of GSM and Mobile Computing

Services:

1. Voice Services:

o Circuit-switched voice communication.

2. Data Services:

o SMS, MMS, and mobile internet (GPRS/EDGE).

3. Supplementary Services:

o Call forwarding, call waiting, and conferencing.

Architecture of Mobile Computing:

1. Mobile Device:

o Smartphones, tablets, or laptops.

2. Communication Network:

o Cellular (GSM/CDMA), Wi-Fi, or satellite.

3. Middleware:

o Provides connectivity and seamless communication.

4. Mobile Applications:

o Banking apps, email, navigation.


4. Middleware and Gateway for Mobile Computing

Middleware:

 Acts as a bridge between mobile devices and back-end systems.

 Functions:

1. Data synchronization.

2. Authentication and security.

3. Session management.

Gateway:

 Intermediary that connects mobile devices to the internet or enterprise systems.

 Functions:

1. Protocol translation.

2. Load balancing.

3. Content adaptation.

5. Mobile IP and Mobile Communication Protocol

Mobile IP:

 Protocol enabling mobile devices to maintain connectivity while changing networks.

 Key Elements:

1. Home Agent (HA):

 Tracks the device's location.

2. Foreign Agent (FA):

 Provides care-of address in a visited network.

3. Care-of Address (CoA):

 Temporary IP address assigned in a foreign network.

4. Tunneling:

 Ensures seamless data delivery.

Mobile Communication Protocols:

1. GSM Protocol Stack:

o Comprises layers such as Radio Resource Management, Mobility Management, and Call Control.

2. GPRS Protocol Stack:

o Adds packet-switched capabilities to GSM.


6. Communication Satellites

Definition:

 Satellites enabling communication between distant locations on Earth.

Types:

1. Geostationary Orbit (GEO):

o Stationary relative to Earth, used for broadcasting.

2. Medium Earth Orbit (MEO):

o Covers larger areas; used for GPS.

3. Low Earth Orbit (LEO):

o Close to Earth; used for internet services.

Applications:

1. Global communication.

2. GPS navigation.

3. Satellite internet (e.g., Starlink).

7. Wireless Networks and Topologies

Types of Wireless Networks:

1. WPAN (Wireless Personal Area Network):

o Short range, e.g., Bluetooth.

2. WLAN (Wireless Local Area Network):

o Medium range, e.g., Wi-Fi.

3. WMAN (Wireless Metropolitan Area Network):

o Covers cities, e.g., WiMAX.

4. WWAN (Wireless Wide Area Network):

o Large-scale networks, e.g., 4G, 5G.

Wireless Topologies:

1. Ad Hoc:

o Peer-to-peer communication.

2. Infrastructure:

o Centralized access via an access point.

3. Mesh:

o Devices communicate in a multi-hop manner.


8. Cellular Topology

Definition:

 Cellular networks divide geographic areas into cells, each served by a base station.

Features:

1. Frequency reuse.

2. Seamless handover between cells.

3. Supports multiple users simultaneously.

9. Mobile Ad Hoc Networks (MANETs)

Definition:

 Decentralized, infrastructure-less networks formed by mobile devices.

Features:

1. Dynamic topology.

2. Self-configuring and self-healing.

3. Used in disaster recovery and military applications.

10. Wireless Transmission and Wireless LANs

Wireless Transmission:

1. Radio Waves:

o Long-range; used in Wi-Fi and Bluetooth.

2. Microwaves:

o Medium-range; used in satellite communication.

3. Infrared:

o Short-range; used in remote controls.

Wireless LANs (WLAN):

 Provides wireless connectivity within a limited area.

 Standards: IEEE 802.11 (Wi-Fi).

11. Wireless Geolocation Systems

Definition:

 Systems that determine the geographic location of devices.

Techniques:

1. GPS (Global Positioning System):

o Satellite-based.
2. Cellular Network Triangulation:

o Based on signal strength from multiple towers.

3. Wi-Fi Positioning:

o Uses access point locations.

12. GPRS (General Packet Radio Service) and SMS (Short Messaging Service)

GPRS:

1. Definition:

o Packet-switched technology enabling internet access on GSM.

2. Features:

o Speeds up to 115 kbps.

o Billing based on data volume.

SMS:

1. Definition:

o Text messaging service.

2. Features:

o 160-character limit per message.

o Supported by GSM and CDMA.


9. Cloud Computing and IoT:
Detailed Notes on Cloud Computing and IoT

1. Cloud Computing
Definition:
Cloud computing delivers computing services such as servers, storage, databases, networking, software,
and analytics over the internet ("the cloud").

2. Service Models of Cloud Computing


1. Software as a Service (SaaS):
 Definition: Software is provided as a service accessible via a web browser. Users do not need to
install or maintain software.
 Examples: Gmail, Google Workspace, Microsoft Office 365.
 Features:
1. Multi-tenancy.
2. Subscription-based pricing.
3. Accessible from any device.
2. Platform as a Service (PaaS):
 Definition: Provides a platform to develop, run, and manage applications without managing the
underlying infrastructure.
 Examples: Google App Engine, Microsoft Azure PaaS, AWS Elastic Beanstalk.
 Features:
1. Development tools.
2. Scalability and flexibility.
3. Integrated development environments.
3. Infrastructure as a Service (IaaS):
 Definition: Provides virtualized computing resources over the internet. Users manage applications,
data, runtime, and middleware.
 Examples: Amazon Web Services (AWS), Microsoft Azure IaaS, Google Compute Engine.
 Features:
1. On-demand resources.
2. Cost-efficient scalability.
3. Virtualized hardware.
3. Cloud Deployment Models
1. Public Cloud:
 Definition: Cloud resources are owned and operated by a third-party provider and shared among
multiple customers.
 Examples: AWS, Google Cloud, Microsoft Azure.
 Features:
1. Economical for small and medium businesses.
2. No infrastructure maintenance by users.
3. High scalability.
2. Private Cloud:
 Definition: Cloud resources are used exclusively by a single organization.
 Examples: VMware Private Cloud, OpenStack.
 Features:
1. Greater control and security.
2. Suitable for sensitive data handling.
3. High cost compared to public clouds.

4. Virtualization and Virtual Servers


Virtualization:
 Definition: The creation of a virtual version of physical hardware, operating systems, or network
resources.
 Types:
1. Server Virtualization: Divides a physical server into multiple virtual servers.
2. Network Virtualization: Combines multiple networks or divides a network into segments.
3. Storage Virtualization: Pools physical storage from multiple devices.
Virtual Servers:
 Definition: Software-based emulation of physical servers.
 Benefits:
1. Efficient resource utilization.
2. Cost-effective.
3. Scalable and flexible.
5. Cloud Storage
Definition:
Cloud storage is a service model where data is maintained, managed, and backed up remotely and made
available over the internet.
Examples:
 Google Drive, Dropbox, Amazon S3, Microsoft OneDrive.
Features:
1. Access from anywhere.
2. Data redundancy and backup.
3. Cost-efficient and scalable.

6. Database Storage
Definition:
Database storage in cloud computing involves storing structured or unstructured data in cloud-hosted
databases.
Examples:
 Amazon RDS, Google Cloud Spanner, MongoDB Atlas.
Advantages:
1. Scalability and performance optimization.
2. Automated backups.
3. Real-time analytics.

7. Resource Management in Cloud Computing


Definition:
Resource management refers to the allocation and management of computing resources in a cloud
environment.
Key Aspects:
1. Dynamic Resource Allocation:
o Adjust resources based on demand.
2. Load Balancing:
o Distributes workloads across multiple resources.
3. Monitoring and Optimization:
o Tracks resource utilization and optimizes performance.
8. Service Level Agreement (SLA)
Definition:
An SLA is a contract between a cloud service provider and a customer defining the service standards and
guarantees.
Components:
1. Performance Metrics:
o Uptime, response time, and throughput.
2. Compensation and Penalties:
o Defined for service failures.
3. Security and Privacy:
o Ensures data protection.
4. Responsibilities:
o Specifies responsibilities of both provider and customer.

9. Basics of IoT (Internet of Things)


Definition:
IoT refers to the network of interconnected physical devices embedded with sensors, software, and other
technologies to exchange data over the internet.

10. Components of IoT


1. Sensors/Devices:
 Collect data from the environment (e.g., temperature, motion).
2. Connectivity:
 Connects devices via Wi-Fi, Bluetooth, Zigbee, or cellular networks.
3. Data Processing:
 Collected data is processed and analyzed using edge or cloud computing.
4. User Interface:
 Enables users to interact with IoT systems through apps or dashboards.
11. Applications of IoT
1. Smart Homes:
 Devices like smart thermostats, lights, and security cameras.
2. Healthcare:
 Wearable devices to monitor health parameters.
3. Agriculture:
 Smart irrigation and weather monitoring systems.
4. Industrial IoT (IIoT):
 Predictive maintenance and automation.

12. Advantages of IoT


1. Increased efficiency and automation.
2. Improved decision-making with real-time data.
3. Enhanced quality of life through smart solutions.

13. Challenges in IoT


1. Security and privacy concerns.
2. Interoperability between devices.
3. Data overload and processing.

You might also like