SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Applications of Networking

1. Resource Access
                Regardless of the physical location of the resources and the users, networks can provide
   special computing resources with convenient access at any time to its users. These resources sharing
   may be of specialized computers, software or other devices that are expensive or unique. For example
   accessing a corporate supercomputer from workstations at remote research laboratories.


2. Data Access
            Networks can provide access to unique database to its local and remote users.


3. Communication and Data Exchange
            Networks allow users to exchange data, graphs or documents and to communicate using
   email, bulletin boards or by teleconference, irrespective of the time or their location.


4. Decentralization of Data Processing
            A complicated job can be divided into multiple modules and can be distributed to different
   departments for processing.


5. Easy Communication
            Various organizations cooperating in a task can communicate with each other on network
   and exchange information.




   Internet Security
                  As internet is open to all, the security, privacy, authenticity and anonymity issues play a
   vital role as one need to be sure about these things, then only he can use the Internet to its fullest
   extent. As information and its transfer are crucial for every one who is using the internet, there need to
   be provisions, which is reliable then only one can connect to internet. The security of internet can be
   divided into two broad categories, namely:
1. Client-Server Security
       2. Data & Transaction Security


Client-Server Security
               This security is for preventing unauthorized access to restricted databases and other
information which is confidential. This is an authorization mechanism, which makes it sure that the users,
who are authorized only should be able to connect and access the information. These mechanisms are required
to ensure that only authenticated users can access the resources, which they are entitled to. Password
protection, encrypted smart cards, biometrics, firewalls etc. are some of the methods adopted to ensure client-
server security.


Data & Transaction Security
               As the data transmissions and transactions occur across the network, there are fair chances that
they can be intercepted, read and manipulated as well as the source and destination can be tracked. To prevent
this one has to provide security to the data and transactions, which is usually done by using data encryptions,
which is implemented through various cryptographic methods.


Security Methods for Client/Server & Data/Transaction Security


   1. Password Scheme:
                   This is an easy solution to provide security, so that unauthorized users do not get access to the
       data. This is the first level of security, which can be provided. Here, the authorized users are assigned
       user names and a password is associated to them, which are to provided when connecting to the site.
       But this security measure can be broken easily, if common words or proper names are used as
       passwords, but if alphanumeric passwords of bigger length are used, then it is very difficult to break
       them.
               Another problem is that, if the login is remote, then the password travels through the system to
       server for authentication, in meantime, it can be trapped, for this reason the passwords are to be
       encrypted before transmitting them.
                    But in spite of these threats, password schemes are still the most popular forms of ensuring
       security.
2. Firewalls
           Firewall is accepted as the network protection mechanism, it is a barrier between corporate
   network and the outside world, which will ensure that the authentic users only connect as well only the
   data which is harmless enters and leaves the system.
           The term firewall can be defined as a device, a computer or a router which is placed between
   the network and the internet to control and monitor the traffic between the inside and outside world.
           Firewall is a device which is used to shield vulnerable areas from various dangers. The firewall
   system is located at a gateway point which actually is the connecting point to the outside world.
   Firewalls come in many varieties and offer different features, but the basic feature is to filter the traffic
   of data and control it.


3. Encryption
           This method of data and transaction security is used for retaining confidentiality and integrity
   of the data being transmitted. Data confidentiality is that property, which makes data contents to be
   safe from being read, while on the path of transmission, which is made sure by using cryptography
   algorithms for encrypting data, which no one can interpret. Along with data being confidential, it has
   to remain unmodified, while on transit i.e. the data should be intact without any modifications, while it
   is on way to destination. This is made sure by using various encryption techniques like Secret-Key
   Cryptography, Data Encryption Standard(DES), Public Key Cryptography RSA etc.


   Analog Signals
   Analog signals are continuous in nature, they carry information in the form of waves e.g., the way
   sound travels in the medium such as telephone lines. Analog communication uses general purpose
   communication channels. These signals are characterized by two parameters such as amplitude and
   frequency.


   Digital Signals
   Digital signals are discrete in nature. They transfer information in the form of 0s and 1s. in digital
   communication, data are transmitted directly in binary form that is a sequence of 0s and 1s. to transmit
   binary data over these channels 0s and 1s should be converted to the electrical signals. This is done by
   Modem (modulator-demodulator). Digital signals are preferred over analog signals. Because of the
discrete nature, these signals are not affected by noise or any other disturbances. Moreover, computer
at the receiving end does not perform any conversion as in analog signals i.e. analog to digital.




Packet Transmission:
•   Computers use data grouped into packets for transmission
•   Local Area Networks
•   Wide Area Networks
•   Addressing and Routing

Concepts of Packets:

• Computer networks divide data into small blocks called packets
• Packets are send individually
• Often called packet networks and packet switching networks
• Motivation for using packets
  o Sender and receiver needs to coordinate transmission to ensure that data
     arrives correctly
  o Helps determine which blocks arrive intact and which do not
  o Computers often share underlying connections and hardware
  o Packet switching helps ensure fairness to access
Shared Resources:
1. The first networks
   1.1. A 5 MB file at 56 Kbps will take 12 min to transfer from A to D
   1.2. B & C must wait
2. Packet networks
   2.1. Divide data into packets of 1000 bytes each
   2.2. A sends a packet to D taking only 143 ms
   2.3. B transmits data to C
   2.4. A continues
3. No long delays
Packets and TDM

1) Time Division Multiplexing
  a) Many resources take turns accessing the shared communication resources
2) All sources receive prompt service
3) The source with less




Packets and Frames

1.   Packet refers to a small block of data
2.   Each hardware technology uses different packet format
3.   Frame denotes packet used with specific type of network
4.   EX : RS-232 mechanism
     4.1. Does not include a mechanism that allows a sender to signal the end of a block of
          characters
     4.2. Sending and receiving computers must agree on such details

5. Network systems can choose two unused values to define format
6. EX: RS-232 can use frame delimiters
   6.1. Soh –start of header
   6.2. Eot – end of transmission
7. Overhead is an disadvantage
   7.1. An extra, unnecessary character between blocks of data
8. Advantageous when large delays or computer crashes
   8.1. Missing eot indicates sending computer crashed
   8.2. Missing soh indicates receiver missed beginning of frame
Packet transmission:

               A packet transmission rate control scheme between nodes on a wireless Ad-hoc
       network is proposed considering the characteristics of Wireless LAN rent transmission
       efficiencies by different transmission distances. Many energy efficient routing algorithms
       researches have been conducted only on the assumption of ideal experimental cases. This
       paper considers the way of finding suitable transmission rate for the transmission distances
       between nodes on a mobile Ad-hoc networks so that a more realizable method is presented.
       In this research, a controlling algorithm for transmission data rates by the distances
       between mobile nodes is realized using Fuzzy logic, possibly available to be applied to Ad-
       hoc network routing, and simulations are conducted to verify the enhancements in
       throughput.


       Long distance communication:

method of forming a long distance communication channel between two
telephone devices each of which are connected to a PSTN, said method
comprising

a user of one of said telephone devices initiating and establishing a
telephone communication with a first commercial access provider node of
INTERNET and providing thereto a telephone address,

using INTERNET to establish a communication channel between said first
commercial access provider node and a second commercial access provider
node of INTERNET and providing said telephone address to said second
commercial access provider node,

said second commercial access provider node using said telephone address
and a telephone dial out capability of said second commercial access
provider node to establish a communication with a telephone device at the
telephone address using a PSTN, and

using the INTERNET communication channel to link said telephone devices and
form a real time voice communication between said telephone devices.

2. A method as claimed in claim 1 including, after initiating said
telephone communication with said first commercial access provider node,
said first commercial access provider node communicates with said user to
establish authorization for completing a long distance communication.

3. A method as claimed in claim 1 wherein said first and second commercial
access provider nodes encrypt signals there between and decrypt received
signals such that signals transmitted over INTERNET are encrypted.
4. A method as claimed in claim 1 wherein said telephone devices are
conventional telephones.

5. A method as claimed in claim 4 wherein signals transmitted between said
commercial access nodes using INTERNET are encrypted.

6. A method as claimed in claim 1 wherein the originating telephone device
has a predetermined arrangement with said first commercial access provider
node and said second telephone device has no prior relationship with
either of said commercial access provider nodes.

7. A method as claimed in claim 5 wherein each commercial access node has
different DID telephone addresses for voice and facsimile transmissions.

8. A method of establishing a long distance telephone communication between
an initiating telephone device and a receiving device telephone identified
by a telephone address, said method comprising using a PSTN to initiate a
telephone communication with a commercial access provider node of a
digitized packet based network and provide the node with said telephone
address, said commercial access provider node causing a real time voice
communication channel to be formed between said telephone devices, which
communication channel includes an initial PSTN segment between the
initiating telephone device and said commercial access provider node a
digitized packet based network segment between said commercial access
provider node, and a further commercial access provider node and a PSTN
segment between said further commercial access provider node and the
telephone device identified by the telephone address, wherein the further
commercial access provider node uses the telephone address and the PSTN to
initiate the PSTN segment there between.

9. A method as claimed in claim 8 wherein said telephone devices are
conventional telephones.

10. A method of forming a long distance telephone communication between a
first telephone device and a second telephone device which communication
is capable of transmitting real time voice communications similar to
existing long distance voice telephone communications, comprising the
steps of

forming an initial telephone link between the first telephone device and a
commercial access provider node of a digitized packet based network and
providing thereto a telephone address of the second telephone device, said
commercial access provider forming an appropriate digitized packet based
communication channel with a further commercial access provider node
located in closer proximity to the location of the second telephone device
and providing thereto said telephone address, said further commercial
access provider establishing a telephone link with said second telephone
device using said telephone address, and then linking said telephone
devices using said digitized packet based communication channel thereby
forming a real time voice communication between said telephone devices.

11. A method as claimed in claim 10 wherein said second telephone device
requires no prearrangement with said further commercial access provider
node.

12. A communication arrangement for long distance telephone to telephone
voice communication comprising a first provider node of a digitized packet
based network having means to allow users to initiate a telephone
communication with a desired telephone device identified by a telephone
address by the steps of initially forming a communication with said first
provider node and providing said telephone address thereto,

said first provider node cooperating with a second provider node of said
digitized packet network to form a real time voice communication channel
there between and said second provider node including dial out capabilities
which are used upon receipt of the telephone address provided thereto to
form a telephone communication with the telephone device,

said second provider cooperating with said first provider node to link the
telephone devices using a digitized packet based network segment between
said provider nodes and using PSTN segments between the initiating
telephone device and the first provider node and between the second
commercial access provider node and said telephone device identified by
said telephone address,

wherein the first and second provider nodes appropriately process the
signals for transmission using the digitized packet based network.

13. A communication arrangement as claimed in claim 12 wherein the signals
transmitted over the digitized packet based network are encrypted by said
commercial access provider nodes.

14. A long distance telephone communication arrangement having three
distinct communication segments, comprising a first communication segment
which carries voice communication over a PSTN between a first telephone
device and a first commercial access provider node of a digitized racket
based network a second segment between said first commercial access
provider node and a second commercial access provider node of said
digitized packet based network which exchange digitized voice packets
there between based on communications received from the first and third
segments, said third segment carrying voice communication over a PSTN
between a second telephone device and said second commercial access
provider node after said second commercial access provider node has
established said third segment with said second telephone device, and
wherein said second commercial access provider establishes said third
segment with said second telephone device by using the telephone address
of said second telephone device provided thereto by said first provider
which received the telephone address in a communication from said first
telephone device.

15. A long distance telephone communication arrangement as claimed in claim
14 wherein said first and second commercial access provider nodes carry
out all necessary signal conversion to and from the first and third
segments.

16. A long distance telephone communication arrangement as claimed in claim
14 wherein said first and second commercial access provider nodes encrypt
signals transmitted on the second segment.

17. A long distance telephone communication arrangement as claimed in claim
14 wherein said first and second commercial access provider nodes convert
the signals for transmission by the second segment to a different form
relative to the signals carried by the first and third segments.

18. A long distance telephone communication arrangement having three
distinct communication segments for transmitting a signal, comprising a
first communication segment which carries voice communication over a PSTN
between a first telephone device and a first commercial access provider of
a digitized packet based network, a second segment between said first
commercial access provider and a second commercial access provider of said
digitized packet based network which exchange digitized voice packets
there between based on communications received thereby, and a third segment
which carries voice communication over a PSTN between a second telephone
device and said second commercial access provider and wherein said first
and second commercial access providers convert the signal to and from the
first and third segments whereby the signal carried by the second segment
is in a form different from the signal carried by at least one of the
first and third segments, and wherein said second commercial access
provider establishes said third segment with said second telephone device
by using the telephone address of said second telephone device provided
thereto by said first provider which received the telephone address in a
communication from said first telephone device.

19. A long distance telephone communication arrangement comprising a
digitized packet based network segment between at least two commercial
access providers of the digitized packet based network, said commercial
access providers cooperating to form a communication channel having a real
time digitized packet based communication segment, said communication
channel linking a first telephone device and a second telephone device,
said communication channel being established upon receipt of an initial
telephone communication with one of said commercial access providers from
said first telephone device which communication includes a telephone
address of the second telephone device, and where after said telephone
address is transmitted over the digitized packet based network to the
other commercial access provider which uses the same to form a telephone
communication with said second telephone device identified by the
telephone address, and thereafter said telephone devices are connected
using the digitized packet based segment.

Weitere ähnliche Inhalte

Was ist angesagt? (19)

Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
Networks
NetworksNetworks
Networks
 
Data communications and computer networks
Data communications and computer networksData communications and computer networks
Data communications and computer networks
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Transmission Media for Networking
Transmission Media for NetworkingTransmission Media for Networking
Transmission Media for Networking
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
 
Network models
Network  modelsNetwork  models
Network models
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
 
Chapter 08 communication and network csc
Chapter 08 communication and network cscChapter 08 communication and network csc
Chapter 08 communication and network csc
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Trends of it
Trends of itTrends of it
Trends of it
 
Computer network
Computer networkComputer network
Computer network
 
Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
 

Andere mochten auch

Andere mochten auch (11)

Unit2
Unit2Unit2
Unit2
 
Unit3rd
Unit3rdUnit3rd
Unit3rd
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Data Mining and Data Warehousing
Data Mining and Data WarehousingData Mining and Data Warehousing
Data Mining and Data Warehousing
 
data mining and data warehousing
data mining and data warehousingdata mining and data warehousing
data mining and data warehousing
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
 
Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2
 
Computer Network Notes UNIT II
Computer Network Notes UNIT IIComputer Network Notes UNIT II
Computer Network Notes UNIT II
 
Dcn unit 2 ppt
Dcn unit 2 pptDcn unit 2 ppt
Dcn unit 2 ppt
 

Ähnlich wie Unit2[1]

Ähnlich wie Unit2[1] (20)

Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 
Lecture2
Lecture2Lecture2
Lecture2
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !
 
Note1
Note1Note1
Note1
 
Packet switching
Packet switchingPacket switching
Packet switching
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
Note 1
Note 1Note 1
Note 1
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 

Mehr von Anshumali Singh (17)

Shai 2
Shai 2Shai 2
Shai 2
 
Shai
ShaiShai
Shai
 
Outputdevice
OutputdeviceOutputdevice
Outputdevice
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture2
Lecture2Lecture2
Lecture2
 
Datastorage
DatastorageDatastorage
Datastorage
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
First Chapter
First ChapterFirst Chapter
First Chapter
 
Unit I
Unit IUnit I
Unit I
 

Kürzlich hochgeladen

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Unit2[1]

  • 1. Applications of Networking 1. Resource Access Regardless of the physical location of the resources and the users, networks can provide special computing resources with convenient access at any time to its users. These resources sharing may be of specialized computers, software or other devices that are expensive or unique. For example accessing a corporate supercomputer from workstations at remote research laboratories. 2. Data Access Networks can provide access to unique database to its local and remote users. 3. Communication and Data Exchange Networks allow users to exchange data, graphs or documents and to communicate using email, bulletin boards or by teleconference, irrespective of the time or their location. 4. Decentralization of Data Processing A complicated job can be divided into multiple modules and can be distributed to different departments for processing. 5. Easy Communication Various organizations cooperating in a task can communicate with each other on network and exchange information. Internet Security As internet is open to all, the security, privacy, authenticity and anonymity issues play a vital role as one need to be sure about these things, then only he can use the Internet to its fullest extent. As information and its transfer are crucial for every one who is using the internet, there need to be provisions, which is reliable then only one can connect to internet. The security of internet can be divided into two broad categories, namely:
  • 2. 1. Client-Server Security 2. Data & Transaction Security Client-Server Security This security is for preventing unauthorized access to restricted databases and other information which is confidential. This is an authorization mechanism, which makes it sure that the users, who are authorized only should be able to connect and access the information. These mechanisms are required to ensure that only authenticated users can access the resources, which they are entitled to. Password protection, encrypted smart cards, biometrics, firewalls etc. are some of the methods adopted to ensure client- server security. Data & Transaction Security As the data transmissions and transactions occur across the network, there are fair chances that they can be intercepted, read and manipulated as well as the source and destination can be tracked. To prevent this one has to provide security to the data and transactions, which is usually done by using data encryptions, which is implemented through various cryptographic methods. Security Methods for Client/Server & Data/Transaction Security 1. Password Scheme: This is an easy solution to provide security, so that unauthorized users do not get access to the data. This is the first level of security, which can be provided. Here, the authorized users are assigned user names and a password is associated to them, which are to provided when connecting to the site. But this security measure can be broken easily, if common words or proper names are used as passwords, but if alphanumeric passwords of bigger length are used, then it is very difficult to break them. Another problem is that, if the login is remote, then the password travels through the system to server for authentication, in meantime, it can be trapped, for this reason the passwords are to be encrypted before transmitting them. But in spite of these threats, password schemes are still the most popular forms of ensuring security.
  • 3. 2. Firewalls Firewall is accepted as the network protection mechanism, it is a barrier between corporate network and the outside world, which will ensure that the authentic users only connect as well only the data which is harmless enters and leaves the system. The term firewall can be defined as a device, a computer or a router which is placed between the network and the internet to control and monitor the traffic between the inside and outside world. Firewall is a device which is used to shield vulnerable areas from various dangers. The firewall system is located at a gateway point which actually is the connecting point to the outside world. Firewalls come in many varieties and offer different features, but the basic feature is to filter the traffic of data and control it. 3. Encryption This method of data and transaction security is used for retaining confidentiality and integrity of the data being transmitted. Data confidentiality is that property, which makes data contents to be safe from being read, while on the path of transmission, which is made sure by using cryptography algorithms for encrypting data, which no one can interpret. Along with data being confidential, it has to remain unmodified, while on transit i.e. the data should be intact without any modifications, while it is on way to destination. This is made sure by using various encryption techniques like Secret-Key Cryptography, Data Encryption Standard(DES), Public Key Cryptography RSA etc. Analog Signals Analog signals are continuous in nature, they carry information in the form of waves e.g., the way sound travels in the medium such as telephone lines. Analog communication uses general purpose communication channels. These signals are characterized by two parameters such as amplitude and frequency. Digital Signals Digital signals are discrete in nature. They transfer information in the form of 0s and 1s. in digital communication, data are transmitted directly in binary form that is a sequence of 0s and 1s. to transmit binary data over these channels 0s and 1s should be converted to the electrical signals. This is done by Modem (modulator-demodulator). Digital signals are preferred over analog signals. Because of the
  • 4. discrete nature, these signals are not affected by noise or any other disturbances. Moreover, computer at the receiving end does not perform any conversion as in analog signals i.e. analog to digital. Packet Transmission: • Computers use data grouped into packets for transmission • Local Area Networks • Wide Area Networks • Addressing and Routing Concepts of Packets: • Computer networks divide data into small blocks called packets • Packets are send individually • Often called packet networks and packet switching networks • Motivation for using packets o Sender and receiver needs to coordinate transmission to ensure that data arrives correctly o Helps determine which blocks arrive intact and which do not o Computers often share underlying connections and hardware o Packet switching helps ensure fairness to access Shared Resources: 1. The first networks 1.1. A 5 MB file at 56 Kbps will take 12 min to transfer from A to D 1.2. B & C must wait 2. Packet networks 2.1. Divide data into packets of 1000 bytes each 2.2. A sends a packet to D taking only 143 ms 2.3. B transmits data to C 2.4. A continues 3. No long delays
  • 5. Packets and TDM 1) Time Division Multiplexing a) Many resources take turns accessing the shared communication resources 2) All sources receive prompt service 3) The source with less Packets and Frames 1. Packet refers to a small block of data 2. Each hardware technology uses different packet format 3. Frame denotes packet used with specific type of network 4. EX : RS-232 mechanism 4.1. Does not include a mechanism that allows a sender to signal the end of a block of characters 4.2. Sending and receiving computers must agree on such details 5. Network systems can choose two unused values to define format 6. EX: RS-232 can use frame delimiters 6.1. Soh –start of header 6.2. Eot – end of transmission 7. Overhead is an disadvantage 7.1. An extra, unnecessary character between blocks of data 8. Advantageous when large delays or computer crashes 8.1. Missing eot indicates sending computer crashed 8.2. Missing soh indicates receiver missed beginning of frame
  • 6. Packet transmission: A packet transmission rate control scheme between nodes on a wireless Ad-hoc network is proposed considering the characteristics of Wireless LAN rent transmission efficiencies by different transmission distances. Many energy efficient routing algorithms researches have been conducted only on the assumption of ideal experimental cases. This paper considers the way of finding suitable transmission rate for the transmission distances between nodes on a mobile Ad-hoc networks so that a more realizable method is presented. In this research, a controlling algorithm for transmission data rates by the distances between mobile nodes is realized using Fuzzy logic, possibly available to be applied to Ad- hoc network routing, and simulations are conducted to verify the enhancements in throughput. Long distance communication: method of forming a long distance communication channel between two telephone devices each of which are connected to a PSTN, said method comprising a user of one of said telephone devices initiating and establishing a telephone communication with a first commercial access provider node of INTERNET and providing thereto a telephone address, using INTERNET to establish a communication channel between said first commercial access provider node and a second commercial access provider node of INTERNET and providing said telephone address to said second commercial access provider node, said second commercial access provider node using said telephone address and a telephone dial out capability of said second commercial access provider node to establish a communication with a telephone device at the telephone address using a PSTN, and using the INTERNET communication channel to link said telephone devices and form a real time voice communication between said telephone devices. 2. A method as claimed in claim 1 including, after initiating said telephone communication with said first commercial access provider node, said first commercial access provider node communicates with said user to establish authorization for completing a long distance communication. 3. A method as claimed in claim 1 wherein said first and second commercial access provider nodes encrypt signals there between and decrypt received signals such that signals transmitted over INTERNET are encrypted.
  • 7. 4. A method as claimed in claim 1 wherein said telephone devices are conventional telephones. 5. A method as claimed in claim 4 wherein signals transmitted between said commercial access nodes using INTERNET are encrypted. 6. A method as claimed in claim 1 wherein the originating telephone device has a predetermined arrangement with said first commercial access provider node and said second telephone device has no prior relationship with either of said commercial access provider nodes. 7. A method as claimed in claim 5 wherein each commercial access node has different DID telephone addresses for voice and facsimile transmissions. 8. A method of establishing a long distance telephone communication between an initiating telephone device and a receiving device telephone identified by a telephone address, said method comprising using a PSTN to initiate a telephone communication with a commercial access provider node of a digitized packet based network and provide the node with said telephone address, said commercial access provider node causing a real time voice communication channel to be formed between said telephone devices, which communication channel includes an initial PSTN segment between the initiating telephone device and said commercial access provider node a digitized packet based network segment between said commercial access provider node, and a further commercial access provider node and a PSTN segment between said further commercial access provider node and the telephone device identified by the telephone address, wherein the further commercial access provider node uses the telephone address and the PSTN to initiate the PSTN segment there between. 9. A method as claimed in claim 8 wherein said telephone devices are conventional telephones. 10. A method of forming a long distance telephone communication between a first telephone device and a second telephone device which communication is capable of transmitting real time voice communications similar to existing long distance voice telephone communications, comprising the steps of forming an initial telephone link between the first telephone device and a commercial access provider node of a digitized packet based network and providing thereto a telephone address of the second telephone device, said commercial access provider forming an appropriate digitized packet based communication channel with a further commercial access provider node located in closer proximity to the location of the second telephone device
  • 8. and providing thereto said telephone address, said further commercial access provider establishing a telephone link with said second telephone device using said telephone address, and then linking said telephone devices using said digitized packet based communication channel thereby forming a real time voice communication between said telephone devices. 11. A method as claimed in claim 10 wherein said second telephone device requires no prearrangement with said further commercial access provider node. 12. A communication arrangement for long distance telephone to telephone voice communication comprising a first provider node of a digitized packet based network having means to allow users to initiate a telephone communication with a desired telephone device identified by a telephone address by the steps of initially forming a communication with said first provider node and providing said telephone address thereto, said first provider node cooperating with a second provider node of said digitized packet network to form a real time voice communication channel there between and said second provider node including dial out capabilities which are used upon receipt of the telephone address provided thereto to form a telephone communication with the telephone device, said second provider cooperating with said first provider node to link the telephone devices using a digitized packet based network segment between said provider nodes and using PSTN segments between the initiating telephone device and the first provider node and between the second commercial access provider node and said telephone device identified by said telephone address, wherein the first and second provider nodes appropriately process the signals for transmission using the digitized packet based network. 13. A communication arrangement as claimed in claim 12 wherein the signals transmitted over the digitized packet based network are encrypted by said commercial access provider nodes. 14. A long distance telephone communication arrangement having three distinct communication segments, comprising a first communication segment which carries voice communication over a PSTN between a first telephone device and a first commercial access provider node of a digitized racket based network a second segment between said first commercial access provider node and a second commercial access provider node of said digitized packet based network which exchange digitized voice packets there between based on communications received from the first and third segments, said third segment carrying voice communication over a PSTN
  • 9. between a second telephone device and said second commercial access provider node after said second commercial access provider node has established said third segment with said second telephone device, and wherein said second commercial access provider establishes said third segment with said second telephone device by using the telephone address of said second telephone device provided thereto by said first provider which received the telephone address in a communication from said first telephone device. 15. A long distance telephone communication arrangement as claimed in claim 14 wherein said first and second commercial access provider nodes carry out all necessary signal conversion to and from the first and third segments. 16. A long distance telephone communication arrangement as claimed in claim 14 wherein said first and second commercial access provider nodes encrypt signals transmitted on the second segment. 17. A long distance telephone communication arrangement as claimed in claim 14 wherein said first and second commercial access provider nodes convert the signals for transmission by the second segment to a different form relative to the signals carried by the first and third segments. 18. A long distance telephone communication arrangement having three distinct communication segments for transmitting a signal, comprising a first communication segment which carries voice communication over a PSTN between a first telephone device and a first commercial access provider of a digitized packet based network, a second segment between said first commercial access provider and a second commercial access provider of said digitized packet based network which exchange digitized voice packets there between based on communications received thereby, and a third segment which carries voice communication over a PSTN between a second telephone device and said second commercial access provider and wherein said first and second commercial access providers convert the signal to and from the first and third segments whereby the signal carried by the second segment is in a form different from the signal carried by at least one of the first and third segments, and wherein said second commercial access provider establishes said third segment with said second telephone device by using the telephone address of said second telephone device provided thereto by said first provider which received the telephone address in a communication from said first telephone device. 19. A long distance telephone communication arrangement comprising a digitized packet based network segment between at least two commercial access providers of the digitized packet based network, said commercial access providers cooperating to form a communication channel having a real
  • 10. time digitized packet based communication segment, said communication channel linking a first telephone device and a second telephone device, said communication channel being established upon receipt of an initial telephone communication with one of said commercial access providers from said first telephone device which communication includes a telephone address of the second telephone device, and where after said telephone address is transmitted over the digitized packet based network to the other commercial access provider which uses the same to form a telephone communication with said second telephone device identified by the telephone address, and thereafter said telephone devices are connected using the digitized packet based segment.