Network Note
Network Note
5. Radiation. It refers to the leakage of signal from the medium due to undesirable
electrical characteristics of the medium.
2. Coaxial Cable
The least expensive and most widely used guided transmission medium.
It is lightweight, cheap, can be installed easily, and they support many different
types of network.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
Typically, a number of these pairs are bundled together into a cable by wrapping
them in a tough protective sheath.
Twisted pair (TP) maybe used to transmit both analog and digital signal.
For analog signals amplifiers are required about every 5 to 6 kms. For digital
signals repeaters are required every 2 to 3kms.
The twisting tends to decrease the crosstalk (EMI) interference between adjacent
pairs in a cable.
Application:-
2. In the telephone system individual residential telephone sets are connected to the
local telephone exchange or to end office by twisted pair wire.
3. Twisted pair also the most common medium used for the digital signaling for
connections to a digital data switch.
The frequency range of the twisted pair cables enable both voice and data
transmission.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ11
connector and 4 pair cable useRJ-45 connector.
Category 1:- These originally used only for voice communication and can support
only low data rates.
Category 2:- Suitable for Voice and Data gives speed upto 4 mbps. This can’t be
used for high speed data communication. Older n/w’s use this category.
Category 3:- It is suitable for most PC n/w’s support data rate of up to 16mbps
currently most telephone n/w uses this.
Category 5:-It offers data rate of 100mbps. Can be used for fast Ethernet. It
requires more insulation and more twist per foot. It requires compatible equipment’s
Advantages:
Installation is easy
Flexible
Cheap
100-meter limit
Higher grades of UTP are used in LAN technologies like Ethernet. Disadvantages:
The only difference between STP and UTP is that STP cables have a shielding in
usually of aluminum or polyester material between the outer jacket and wire.
The shield makes STP less vulnerable to EMI, because the shield is electrically
grounded.
Crosstalk occurs when one line picks up some of the other signals traveling down
another line.
Advantages:
Easy to install
Performance is adequate
Difficult to manufacture
Heavy
Expensive than UTP
2. Co-axial cable
The name coaxial is because it contains two conductors that are parallel to each
other and share common axis.
The outermost part is the plastic cover which protects the whole cable.
Co-axial cable is much less susceptible to interference and cross talk than the
twisted pair.
Application –
Co-axial cable is widely used in the wide variety of applications. The most important
of these are: -
1. TV distribution: - Co-axial cable is spreading rapidly as a means of distributing TV
signals to individual homes –cables TV. A cable TV system can carry dozens or even
hundreds of TV channels at ranges up to a few tens of miles.
3. Short distance communication links: - Co-axial cable is also commonly used for
short range connection between devices. E.g. can be used to provide high speed I/O
channels for an PC system.
4. LAN: - Co-axial cable can be support a large number of devices with a variety of
data and traffic types over distance that covers single building or a complex of
building.
A fiber-optic cable is made of glass or plastic and transmits signals in the form of
light.
(i) Core
(ii) Cladding
(iii) Jacket
1. Core:- It’s the inner most section is made of glass or plastic and is surrounded by
its own cladding. The core diameter is in the range of 8 to 50 µm.
2. Cladding: - A glass or plastic coating that has optical properties different from
those of the core having a diameter of 125 µm. The cladding acts as a reflector to
light that would otherwise escape the core.
3. Jacket: - The outer most layers surrounding caddied fiber is the jacket. Jacket is
composed of plastic or other material layer to protect against moisture, cut, crushing
and other environmental dangers.
2. Unguided Media
Unguided media transmit electromagnetic waves without using a physical
conductor.
Signals are normally broadcast through free space and thus are available to anyone
who has a device capable of receiving them. Electromagnetic Spectrum
(Communication Band) Electromagnetic spectrum is used for wireless
communication. It is divided into various sub-bands.
Propagation Methods Unguided signals can travel from the source to destination in
several ways:
• Ground propagation,
• Sky-Propagation, and
• Line-of-Sight Propagation
1. Ground propagation mode:
• These low-frequency signals proceed in all directions from the transmitting antenna
and follow the curvature of the planet.
• Distance depends on the amount of power in the signal: The greater the power, the
greater the distance.
• In this high-frequency radio waves radiate upward into the ionosphere where they
are reflected back to earth.
• This type of transmission allows for greater distances with lower output power.
Microwave communication
• Electromagnetic waves ranging in frequency between 3 kHz and 1 GHz are normally
called radio waves.
• Radio waves, are omnidirectional, i.e. they are propagated in all directions.
• A sending antenna sends waves that can be received by any receiving antenna.
• Radio waves, particularly of low and medium frequencies, can penetrate walls.
Applications
• The omnidirectional characteristics of radio waves make them useful for
multicasting, in which there is one sender but many receivers.
• AM and FM radio,
• Television,
• Maritime radio,
2. Microwave Transmission
• Electromagnetic waves having frequencies between 1GHz and 300 GHz are called
microwaves.
• This means that the sending and receiving antennas need to be aligned.
• A pair of antennas can be aligned without interfering with another pair of aligned
antennas.
A. Terrestrial Microwave
Application:-
B. Satellite microwave:-
A single orbiting satellite will operate on no. of frequency bands called transponder
channels or simply transponder.
In the fig the satellite is being used to provide a point to point link between two
distant grounds based antenna.
The signal, a beam of modulated microwaves is sent towards the satellite called
UPLINK (6 Ghz).
Then the satellite processes the signal and send it back to the receiver’s antenna
present on the earth’s surface called as DOWNLINK (4Ghz).
The satellite has to receive, process and transmit the signal.
Types of ISDN
• Structure:
• North America: 23 B-channels (64 kbps each) + 1 D-channel (64 kbps).
• Europe and others: 30 B-channels + 1 D-channel.
• Uses:
• Best suited for large businesses or organizations with high
communication needs, such as call centers.
• Allows for multiple voice calls or data sessions to occur simultaneously.
ISDN Channels
ISDN Devices
Advantages of ISDN
1.Higher Data Rates: ISDN provides faster data transmission than traditional
analog phone systems.
2.Simultaneous Voice and Data Transmission: Users can make voice calls
and use data services (such as the internet or fax) at the same time.
3.Reliability and Quality: Digital transmission results in clearer voice quality
and more reliable data connections.
4.Wide Range of Services: ISDN supports voice, video, and data transmission
on a single line, making it versatile for various communication needs.
5.Faster Call Setup: ISDN offers quicker call setup times than analog systems.
Disadvantages of ISDN
1.Cost: ISDN installation and service fees are typically higher than analog
lines, especially for businesses that require PRI.
2.Complexity: ISDN requires specialized equipment (e.g., terminal adapters,
NT1/NT2 devices) and is more complex to set up than analog systems.
3.Limited Availability: ISDN is not as widely available in some rural or remote
areas, especially with the rise of broadband alternatives like DSL and fiber.
4.Superseded by Modern Technologies: With the advent of faster and more
efficient technologies like DSL, cable, and fiber optic internet, ISDN has largely
been replaced in many regions.
Worldwide Wireless Communication
Mobile Phones:
• The most widespread wireless devices, connecting to mobile networks
(2G, 3G, 4G, and 5G) for voice calls, messaging, and internet access.
Tablets & Laptops:
• Wireless-enabled for internet access through Wi-Fi or cellular networks,
allowing portability for work, communication, and entertainment.
Wireless Routers:
• Devices that provide wireless internet connectivity, typically through
Wi-Fi, for homes and businesses.
IoT Devices (Internet of Things):
• Devices like smart home appliances (thermostats, lights), wearable
devices (smartwatches, fitness trackers), and industrial IoT equipment
use wireless protocols like Wi-Fi, Bluetooth, Zigbee, and cellular
networks to communicate.
Wireless Headphones and Earbuds:
• Use Bluetooth or other wireless technologies to connect to devices like
smartphones, tablets, and computers without the need for physical
cables.
Drones:
• Unmanned aerial vehicles (UAVs) that are remotely controlled via
wireless communication, commonly used in surveillance, delivery, or
recreation.
Satellite Phones:
• These phones communicate directly with orbiting satellites, providing
wireless communication in remote areas where cellular networks are
unavailable.
Wireless Printers & Peripheral Devices:
• Devices that connect to computers or networks without physical cables,
typically using Wi-Fi or Bluetooth.
Mobility:
• Users are not restricted by physical connections, enabling seamless
communication and access to services from anywhere within the
network’s range.
Convenience:
• No need for complex wiring setups. Devices can be added or moved
easily without reconfiguring networks or installing cables.
Scalability:
• Wireless networks can accommodate a large number of devices
without the need for additional cabling infrastructure, making them
easier to expand.
Cost-Effective:
• Wireless networks reduce the need for costly wiring, especially in
remote or difficult-to-access areas. Installation is generally faster and
less expensive than wired systems.
Accessibility:
• Wireless communication makes it easier to connect users in rural and
underserved areas where laying physical cables is difficult or
impractical.
Support for IoT:
• Wireless technologies enable the proliferation of IoT devices, which are
crucial for smart homes, cities, and industrial automation.
Limited Bandwidth:
• Wireless networks have a limited spectrum, leading to bandwidth
congestion when too many devices are connected simultaneously.
Interference:
• Wireless signals are susceptible to interference from other electronic
devices, physical obstacles (walls, buildings), or even weather
conditions, which can degrade performance.
Security Concerns:
• Wireless networks are more vulnerable to hacking and unauthorized
access than wired networks. Encryption and security protocols must be
robust to prevent data breaches.
Power Consumption:
• Wireless devices, especially those in constant communication, consume
more battery power, necessitating frequent recharging or the use of
power-efficient communication methods.
Latency:
• Wireless networks, particularly those relying on satellite or mobile
networks, can suffer from latency issues, which can impact real-time
applications like gaming or video conferencing.
Coverage Gaps:
• Wireless communication often faces challenges in providing consistent
coverage in remote or rural areas, as well as inside buildings with thick
walls or underground locations.
Spectrum Regulation:
• Wireless communication relies on radio frequency spectrum, which is
regulated by governments. The availability of spectrum can vary
between countries, and there are limitations on how much spectrum is
available for use.
Health Concerns:
• Some people are concerned about potential health risks associated
with prolonged exposure to radiofrequency (RF) radiation emitted by
wireless devices, although current research has not conclusively proven
any harmful effects.
Cellular Telephony
Path Loss:
• Description: Path loss refers to the weakening of the signal as it travels
over distance. Signal strength decreases as it moves through the air,
over obstacles, and through various materials like buildings, leading to
communication issues.
Fading:
• Description: Fading is the variation in the strength of a signal as it is
received. This can be caused by environmental factors, such as
buildings, trees, and atmospheric conditions.
• Types:
▪ Slow fading: Due to large objects like buildings.
▪ Fast fading: Due to small objects like vehicles or terrain
variations.
Interference:
• Description: Interference occurs when signals from multiple sources
overlap, causing degradation in signal quality. This can happen due to
overlapping frequencies or signals from other electronic devices.
• Types:
▪ Co-channel interference: Interference from neighboring cells
using the same frequency.
▪ Adjacent-channel interference: Interference from frequencies
that are close to the target frequency.
Doppler Shift:
• Description: The Doppler shift is caused by the relative motion
between the mobile device and the base station. As the mobile device
moves, the frequency of the received signal can shift, leading to
degradation in communication quality.
Shadowing:
• Description: Shadowing occurs when large buildings, hills, or other
obstacles block the line of sight between the mobile device and the cell
tower, causing significant drops in signal strength.
Noise:
• Description: External electronic noise from other devices or
environmental factors (e.g., electromagnetic interference) can degrade
the quality of wireless signals.
Types of Handoff/Handover
Hard Handoff:
• Description: A "break-before-make" handoff where the connection
with the current base station is terminated before a new connection is
established with the next base station.
• Usage: Typically used in systems like GSM and CDMA where the mobile
device cannot be connected to two base stations simultaneously.
• Advantages: Simple to implement and uses fewer resources.
• Disadvantages: Higher chance of dropped calls during the switch if the
new connection is not immediately established.
Soft Handoff:
• Description: A "make-before-break" handoff where the mobile device
is connected to two or more base stations at the same time during the
transition. This ensures smoother handoff by maintaining multiple
connections until the new one is stable.
• Usage: Common in CDMA networks.
• Advantages: Lower chance of dropped calls and provides more reliable
handoff.
• Disadvantages: More complex and resource-intensive because it
requires simultaneous connections to multiple base stations.
Horizontal Handoff:
• Description: A handoff between two cells or base stations within the
same wireless system (e.g., moving from one 4G tower to another 4G
tower).
Vertical Handoff:
• Description: A handoff between two different types of networks, such
as moving from a cellular network (4G/5G) to a Wi-Fi network, or vice
versa.
Handoff/Handover Procedure
Measurement:
• The mobile device continuously monitors the signal strength and
quality from its serving base station as well as neighboring base
stations.
Decision:
• A decision is made by the network (or the mobile device in some cases)
to initiate a handoff. This decision is based on factors such as signal
strength, quality, and the distance from the base station.
Execution:
• The network allocates resources (e.g., a new frequency or time slot) at
the target base station for the mobile device.
• In a hard handoff, the mobile device disconnects from the current base
station and connects to the new one. In a soft handoff, the device may
maintain connections to multiple base stations until the process is
complete.
Completion:
• Once the mobile device has successfully connected to the new base
station, the handoff process is complete, and the resources at the
previous base station are freed up.
Handoff Triggers
• Signal Strength: A handoff may be triggered when the signal strength from
the serving base station falls below a certain threshold.
• Signal Quality: Poor signal quality, indicated by high error rates, can trigger a
handoff even if the signal strength is acceptable.
• Cell Load: In some cases, a handoff may be initiated to balance the load
between base stations when one cell is congested.
Frequency Handoff
Intra-frequency Handoff:
• Occurs when the handoff happens between two cells operating on the
same frequency. It’s common in systems like CDMA and WCDMA.
Inter-frequency Handoff:
• Occurs when the handoff happens between two cells operating on
different frequencies. This is often seen in LTE networks when moving
between different frequency bands (e.g., from 2.1 GHz to 800 MHz).
Advantages of Handoff
Challenges in Handoff
Dropped Calls: In a poorly executed hard handoff, there’s a risk of losing the
connection entirely, leading to dropped calls or interruptions in data transfer.
Handoff Delay: The time it takes to perform a handoff can lead to delays in
communication, especially in high-speed environments or dense urban areas
where frequent handoffs are needed.
Resource Management: Soft handoffs require additional network resources
since the mobile device is connected to multiple base stations simultaneously,
which can lead to inefficiencies.
• Shorter latency: Due to the proximity to Earth, the time delay (latency) is
much lower compared to higher orbits. This makes LEO satellites ideal for
services requiring real-time communication, such as satellite internet.
• Smaller coverage area: Each satellite covers a small geographical area, so a
constellation of LEO satellites is needed to provide continuous global
coverage.
• Applications:
• Internet services (e.g., Starlink).
• Earth observation (e.g., remote sensing and environmental monitoring).
• Communication for low-latency applications.
Advantages:
Disadvantages:
Applications:
Advantages:
Disadvantages:
• More latency than LEO systems, though still better than GEO satellites.
• Moderate cost, as fewer satellites are needed compared to LEO, but the
satellites are typically more expensive than LEO units.
• Constant coverage: GEO satellites remain fixed above one location on the
Earth’s surface, making them ideal for continuous communication over specific
areas.
• Large coverage area: Each GEO satellite can cover about one-third of the
Earth’s surface, meaning only three GEO satellites can provide near-global
coverage (excluding polar regions).
Applications:
Advantages:
Disadvantages:
• High latency: Due to the long distance from Earth, there is a higher
communication delay, making it less suitable for real-time applications like
online gaming or voice communication.
• Expensive to launch: GEO satellites require more energy to be launched into
such high orbits and typically have higher costs.
• Limited coverage at high latitudes: GEO satellites cannot provide effective
coverage for the polar regions.
Comparison of LEO, MEO, and GEO Satellites
VLSM is a subnetting technique that allows you to allocate different subnet mask
lengths to different subnets according to their specific needs. This approach enables
efficient IP address utilization, unlike fixed-length subnetting, where all subnets must
have the same subnet mask regardless of the number of hosts.
How VLSM Works
In traditional subnetting, the same subnet mask is applied to all subnets, but in
VLSM, you can vary the subnet mask length based on the size of the subnet. For
example, a subnet with 50 hosts will have a different subnet mask than a subnet with
200 hosts.
VLSM allows more efficient use of IP addresses by enabling different sized subnets in
a single network.
Suppose you are given the network 192.168.10.0/24 and need to create the
following subnets:
• For 100 hosts, you need at least 7 bits for hosts because 2^7 = 128 (126
usable IP addresses, excluding network and broadcast addresses). So the
subnet mask will be /25 (or 255.255.255.128).
• For 50 hosts, you need at least 6 bits for hosts because 2^6 = 64 (62 usable IP
addresses). So the subnet mask will be /26 (or 255.255.255.192).
• For 25 hosts, you need at least 5 bits for hosts because 2^5 = 32 (30 usable IP
addresses). So the subnet mask will be /27 (or 255.255.255.224).
Network: 192.168.10.0/25
Broadcast: 192.168.10.127
Network: 192.168.10.128/26
IP range: 192.168.10.129 - 192.168.10.190
Broadcast: 192.168.10.191
Network: 192.168.10.192/26
Broadcast: 192.168.10.255
Network: 192.168.11.0/27
Broadcast: 192.168.11.31
In this example, VLSM allows the creation of subnets with different sizes according to
the number of required hosts.
Supernetting
Supernetting aggregates multiple Class C networks (or other small subnets) into a
larger block using a shorter subnet mask. For example, you can combine four Class C
networks into a single supernet using a subnet mask of /22.
Example of Supernetting
• 192.168.0.0/24
• 192.168.1.0/24
• 192.168.2.0/24
• 192.168.3.0/24
These four Class C networks can be combined into a single supernet as:
• Supernet: 192.168.0.0/22
Subnet mask: 255.255.252.0
Network range: 192.168.0.0 - 192.168.3.255
This reduces the routing entries from four networks to a single entry, improving
routing efficiency.
Question: You are given the IP address 172.16.0.0/16 and need to create the
following subnets:
• 1 subnet with 500 hosts.
• 2 subnets with 200 hosts each.
• 4 subnets with 100 hosts each.
Solution:
• For 500 hosts: You need at least 9 bits for hosts because 2^9 = 512 (510
usable IPs). So the subnet mask will be /23 (or 255.255.254.0).
• For 200 hosts: You need at least 8 bits for hosts because 2^8 = 256 (254
usable IPs). So the subnet mask will be /24 (or 255.255.255.0).
• For 100 hosts: You need at least 7 bits for hosts because 2^7 = 128 (126
usable IPs). So the subnet mask will be /25 (or 255.255.255.128).
Network: 172.16.0.0/23
Broadcast: 172.16.1.255
Network: 172.16.2.0/24
Broadcast: 172.16.2.255
Network: 172.16.3.0/24
Broadcast: 172.16.3.255
Network: 172.16.4.0/25
IP range: 172.16.4.1 - 172.16.4.126
Broadcast: 172.16.4.127
Network: 172.16.4.128/25
Broadcast: 172.16.4.255
Network: 172.16.5.0/25
Broadcast: 172.16.5.127
Network: 172.16.5.128/25
Broadcast: 172.16.5.255
• 192.168.4.0/24
• 192.168.5.0/24
• 192.168.6.0/24
• 192.168.7.0/24
Solution:
To combine these four Class C networks, we reduce the subnet mask to cover all the
networks.
• Supernet: 192.168.4.0/22
Subnet mask: 255.255.252.0
Network range: 192.168.4.0 - 192.168.7.255
The basic unit of data in ATM is the ATM cell, which has a fixed size of 53 bytes. The
cell consists of two parts:
Generic Flow Control (GFC): 4 bits used to manage traffic at the User-
Network Interface (UNI) level.
Virtual Path Identifier (VPI): 8 or 12 bits used to identify the virtual path.
Virtual Channel Identifier (VCI): 16 bits used to identify the virtual channel
within a virtual path.
Payload Type (PT): 3 bits used to define the type of information in the
payload.
Cell Loss Priority (CLP): 1 bit used to indicate the priority of the cell.
Header Error Control (HEC): 8 bits used for error correction of the header.
ATM supports several Quality of Service (QoS) categories, depending on the type
of application and data being transmitted.
• ABR is designed for applications that can tolerate some delay but need
guaranteed delivery of data.
• In ABR, the sender adjusts its transmission rate based on the current network
conditions (feedback from the network).
• Example: File transfer services.
• The UNI defines the interface between ATM end devices (such as a user’s
computer or router) and the ATM switch at the edge of the network.
• It handles the flow of data between the user and the network.
• The NNI defines the interface between ATM switches within the network.
• It manages the connection between switches, ensuring that data can travel
across the ATM network efficiently.
Virtual Path Identifier (VPI)
• The VPI is part of the ATM cell header and is used to identify the virtual path
for data transmission.
• A virtual path is a bundle of virtual channels, allowing multiple connections
to share the same physical path.
• VPI helps in routing data within the ATM network efficiently.
• GFC is a 4-bit field in the ATM cell header that controls the flow of traffic from
the user device to the network.
• It helps manage congestion at the UNI by controlling the rate at which cells
are transmitted from the user to the network.
ATM uses an additional layer called the ATM Adaptation Layer (AAL), which sits
between higher-layer protocols and the ATM layer. It provides services for converting
user data into a format suitable for transmission via ATM cells.
Types of AAL:
AAL1: Used for constant bit rate services, such as voice or video, where timing
is critical.
AAL2: Designed for variable bit rate traffic, typically for low-bit-rate voice or
video data.
ATM provides several mechanisms for congestion control to ensure efficient data
transmission even in high-traffic conditions:
3. Traffic Shaping: Regulates the flow of data entering the network to avoid
congestion.
4. Policing: Ensures that traffic adheres to the agreed-upon traffic contract (e.g.,
maximum allowable rate).
5. Resource Management (RM) Cells: Special cells used in ABR service to
provide feedback to the sender about network congestion levels.
ATM Application
• Voice over ATM (VoATM): Transmitting voice data over ATM networks.
• Video Conferencing: Real-time video transmission using ATM’s low-latency
service.
• WAN (Wide Area Network) Connectivity: ATM is used to interconnect large
networks and provide high-speed internet access for businesses.
• Broadband Internet Access: ATM is often used in DSL (Digital Subscriber
Line) technology for broadband access.
Question: Calculate the overhead percentage in an ATM cell, given that the payload
is 48 bytes and the header is 5 bytes.
Solution:
Email Composition:
A user writes an email using an email client or webmail interface (like Gmail, Outlook,
etc.). The email consists of a message body, and metadata (such as sender, recipient
addresses, subject, and attachments).
Once the email is written, the email client sends the email to an SMTP (Simple Mail
Transfer Protocol) server. The SMTP server is responsible for forwarding the
message to the recipient's email server.
Email Routing:
The SMTP server identifies the recipient’s email address domain (e.g., example.com)
and routes the email through a series of Mail Transfer Agents (MTAs) to the
recipient’s email server, typically an IMAP (Internet Message Access Protocol) or
POP3 (Post Office Protocol) server.
Email Reception:
The recipient’s email server stores the email until the recipient retrieves it using an
email client. The client communicates with the email server using IMAP or POP3 to
download or sync the email.
Email Retrieval:
The recipient's email client downloads the message from the email server. This
process can either:
• Sync with the server, leaving copies of the email on the server (using
IMAP), or
• Download the emails and remove them from the server (using POP3).
Email Display:
SMTP is the standard protocol used to send emails from an email client to an email
server or between email servers. It is a push protocol, meaning it is designed to
push email from one server to another. SMTP operates at the application layer of the
OSI model.
How SMTP Works:
When you click "send" on your email client, the client connects to the SMTP server
using the SMTP protocol. The SMTP server validates your identity and prepares to
send the email.
The email client sends the email to the SMTP server, which formats the email and
prepares it for delivery.
The SMTP server identifies the recipient’s domain from the email address (e.g.,
@example.com) and uses DNS (Domain Name System) to look up the recipient's
email server.
The SMTP server forwards the email to the recipient's Mail Transfer Agent (MTA),
which may involve routing through multiple intermediate servers.
The recipient’s mail server (either an IMAP or POP3 server) stores the email in the
appropriate mailbox until it is retrieved by the recipient.
Example:
SMTP Ports:
• Port 25: Default port for SMTP, mainly used for server-to-server
communication.
• Port 587: Used for client-to-server communication (sending emails securely
with STARTTLS).
• Port 465: Used for SMTP over SSL (secure email transmission).
POP3 is a retrieval protocol used to download emails from the server to the client.
Once the email is downloaded, it is typically deleted from the server unless the
client is configured to leave copies of messages on the server. POP3 is a simple
protocol that doesn’t synchronize changes made across multiple devices.
The email client connects to the POP3 server using the POP3 protocol. This server
holds the email in the recipient's mailbox.
• Step 2: Authentication:
The client authenticates the user by providing the username and password to access
the mailbox.
The POP3 server sends the email data to the client, which downloads it to the local
machine. By default, POP3 downloads the email and removes it from the server.
• Step 4: Disconnection:
Once the emails are downloaded, the connection to the server is terminated.
Advantages of POP3:
• Works well in environments where the user wants to access emails offline.
• Reduces server storage usage since emails are stored locally on the client
machine.
Disadvantages of POP3:
• Emails are typically removed from the server, which means if you access your
emails on another device, they won’t be available unless manually configured.
• No synchronization between devices.
POP3 Ports:
IMAP is another retrieval protocol but unlike POP3, it allows multiple devices to
access the same email account and sync their mailboxes. IMAP leaves the email on
the server, which allows users to access and manage their emails from different
devices and locations.
How IMAP Works:
The email client connects to the IMAP server. This server stores the email in the
user's mailbox.
IMAP allows the client to sync with the server, meaning changes made in the email
client (like reading, deleting, or moving messages) are reflected on the server and
other devices.
Emails are not fully downloaded to the client by default. Instead, the email header
and body are fetched when requested, saving bandwidth.
IMAP supports organizing emails into folders on the server. These folders are
synchronized across all devices.
Advantages of IMAP:
Disadvantages of IMAP:
IMAP Ports:
Router
A router is a networking device that forwards data packets between different
computer networks. It uses IP addresses to determine the best path for forwarding
the packets and directs the traffic between devices within networks or across the
internet. Routers connect local area networks (LANs) and wide area networks
(WANs) and ensure data reaches its destination.
Wired Routers:
These routers are connected to other network devices (e.g., computers or switches)
using Ethernet cables. They are often used in homes or businesses to manage wired
connections.
Wireless Routers:
Wireless routers allow devices to connect over Wi-Fi without using physical cables.
They are commonly used in homes and offices to provide wireless internet access.
Core Routers:
Core routers are high-performance routers used by Internet Service Providers (ISPs)
to route data within the backbone of the internet. They handle large amounts of data
and connect to other core routers.
Edge Routers:
Edge routers sit at the boundary of a network and connect internal networks to
external networks, such as the internet. They are typically used by ISPs and large
organizations.
Virtual Routers:
Virtual routers are software-based routers that perform the same functions as
physical routers but operate on virtual machines in the cloud or on servers.
Routing Algorithm
Routing algorithms are the methods or protocols used by routers to determine the
best path for forwarding data packets across networks. The two main categories of
routing algorithms are:
2.Link-State Routing:
In link-state routing, routers build a complete map (topology) of the network and use
this map to calculate the shortest path to each destination. The Dijkstra algorithm is
used to compute the shortest path. Each router independently calculates the shortest
path using the network topology.
Optimality Principle
"If router J is on the optimal path from router I to router K, then the optimal path
from J to K also falls along the same path."
In simpler terms, if a router is on the best route between two endpoints, then that
part of the route will also be optimal for any other packets passing through the same
section. This principle helps in designing efficient routing protocols.
• Attackers flood the target with more requests than it can handle.
• The target's resources (e.g., bandwidth, memory, CPU) get consumed, slowing
down or crashing the service.
DDoS (Distributed Denial of Service) Attack
• The attacker infects multiple devices (bots) and uses them to send traffic to a
single target.
• The target becomes overwhelmed by the massive number of requests, causing
disruption or shutdown of the service.
Prim’s Algorithm: Starts from a random node and adds the shortest edge to
the growing MST.
Kruskal’s Algorithm: Sorts all edges and adds the smallest edges to the MST,
ensuring no cycles are formed.
Distance Vector Routing Algorithm
How it Works:
Each router sends its routing table to its neighboring routers at regular
intervals.
The receiving routers update their tables based on the information they
receive, adjusting the distance to each destination.
This process continues until all routers have the most efficient routes to all
network destinations.
• Each router updates its distance vector by examining the distances reported
by its neighbors and selecting the shortest path.
Disadvantages:
• Slow to converge.
• Prone to routing loops.
In Link State Routing, each router maintains a full map (topology) of the network.
Routers broadcast their link state (the condition of their network links) to all other
routers, allowing each router to independently calculate the shortest path to all
destinations.
How it Works:
Advantages:
➢ +8880-02-9138234/113
Country Code:
The country code is the initial segment of a phone number that indicates which
country the call is originating from or being directed to. In this case, +88 is the
international dialing code for Bangladesh.
Trunk Code:
The trunk code is a number that is dialed after the country code to access a specific
area or region within that country. In this example, 02 is the trunk code for Dhaka,
the capital city of Bangladesh.
Link Code:
The link code is not a standard term in telecommunications. However, it can refer to
codes used in specific telecommunications systems to link services or networks. It
may also relate to internal routing mechanisms within a country’s telecommunication
infrastructure.
Extension Code:
The extension code is a number that follows the main telephone number, used
within private networks or organizations to connect calls directly to specific lines or
devices. In this case, 113 could be an internal extension for a particular department
or office.
• Call Routing: The MSC routes calls to and from mobile users, ensuring
connections are established efficiently.
• Handover Management: It manages the transition of ongoing calls from one
cell to another as users move.
• Subscriber Management: The MSC tracks user locations and services,
maintaining records of active sessions.
The subscriber loop design refers to the physical and logical layout of connections
that link end-users to the telecommunications network. Key aspects include:
• Copper or Fiber Optic Cabling: Traditional subscriber loops use copper wires
(POTS), while modern loops may utilize fiber optics for higher bandwidth.
• Distribution Points: These are junctions where subscriber lines converge and
are connected to central offices or exchanges.
The Wireless Local Loop (WLL) is a system that connects subscribers to the public
switched telephone network (PSTN) using wireless technology rather than traditional
wired connections. Key features include:
Telephone Exchange
• Switching Systems: These determine the optimal path for calls between
different lines.
• Control Equipment: Monitors and maintains service quality and performance.
• Call Routing: Manages calls within the organization and routes external calls
to the appropriate extensions.
• Cost Efficiency: Reduces the cost of external phone calls by using internal
lines for communication.
Network Security
Firewalls: Monitors and controls incoming and outgoing network traffic based
on predetermined security rules.
Intrusion Detection Systems (IDS): Detects and alerts on unauthorized
access or anomalies within the network.
Encryption: Secures data by converting it into a code, preventing
unauthorized access during transmission.
Virtual Private Networks (VPNs): Creates secure connections over the
internet, ensuring privacy and data integrity.
Active Attack:
Symmetric Cryptography:
• Description: In symmetric cryptography, the same key is used for both
encryption and decryption.
• Advantages: Fast and efficient for large data volumes.
• Examples: Data Encryption Standard (DES), Advanced Encryption
Standard (AES).
Asymmetric Cryptography:
• Description: Uses a pair of keys – a public key for encryption and a
private key for decryption.
• Advantages: Provides a higher level of security as the private key is not
shared.
• Examples: RSA algorithm, Diffie-Hellman key exchange.
Hash Functions:
• Description: Converts data into a fixed-size hash value, ensuring data
integrity.
• Advantages: Irreversible and provides a unique output for different
inputs.
• Examples: SHA-256, MD5.
DES is a symmetric key algorithm used for data encryption. It was developed in the
1970s and was widely adopted until it was superseded by more secure algorithms.
Security:
Although DES was once considered secure, advancements in computing power have
made it vulnerable to brute-force attacks.
Brute-Force Attack
• Characteristics:
• Time-consuming and computationally expensive.
• The time to crack increases exponentially with key length.
Example:
RSA Algorithm
• Key Generation:
a. Select two large prime numbers, p and q.
b. Compute n=p×q (modulus).
c. Calculate ϕ(n)=(p−1)(q−1) (Euler's totient function).
d. Choose a public exponent e such that 1<e<ϕ(n) and
gcd(e,ϕ(n))=1.
e. Compute the private exponent d such that d≡e−1modϕ(n).
• Encryption:
• Ciphertext CCC is computed as C≡Memod nC \equiv M^e \mod
nC≡Memodn, where MMM is the plaintext.
• Decryption:
• Plaintext MMM is recovered as M≡Cdmod nM \equiv C^d \mod
nM≡Cdmodn.
Security:
• Process:
d. Two parties agree on a large prime number ppp and a base ggg.
e. Each party selects a private key (e.g., aaa for Alice, bbb for Bob) and
computes their public keys:
▪ Alice: A=gamod pA = g^a \mod pA=gamodp
▪ Bob: B=gbmod pB = g^b \mod pB=gbmodp
f. They exchange their public keys.
g. Each party computes the shared secret:
▪ Alice computes s=Bamod ps = B^a \mod ps=Bamodp
▪ Bob computes s=Abmod ps = A^b \mod ps=Abmodp
Security:
Even if an attacker intercepts the public keys, they cannot easily compute the shared
secret without knowing the private keys.
1. Pretty Good Privacy (PGP)
PGP is a data encryption and decryption program used for securing emails, files, and
texts through cryptography. It combines symmetric-key and public-key cryptography
for enhanced security.
Key Features:
• Encryption: Ensures that only the intended recipient can read the message.
• Digital Signatures: Provides authenticity by allowing the sender to sign
messages.
• Web of Trust: A decentralized trust model where users validate each other's
public keys.
How it Works:
HTTP is the protocol used for transferring hypertext requests and information on the
internet. It forms the foundation of data communication on the web.
Characteristics:
• Stateless Protocol: Each request is independent; the server does not retain
session information.
• Request/Response Model: Clients send requests, and servers respond with
the requested data.
Key Features:
• Encryption: Encrypts the data transmitted between the client and server,
ensuring confidentiality.
• Integrity: Ensures that the data is not altered during transmission.
• Authentication: Confirms the identity of the communicating parties.
SSH is a cryptographic network protocol for operating network services securely over
an unsecured network. It is widely used for secure remote logins and command
execution.
Key Features:
Key Features:
Fast Ethernet refers to Ethernet networks that transmit data at speeds of 100 Mbps.
It is based on the IEEE 802.3u standard.
Key Features:
9. Gigabit Ethernet
Gigabit Ethernet operates at speeds of 1 Gbps (1000 Mbps) and is based on IEEE
802.3ab (for twisted pair) and IEEE 802.3z (for fiber optic).
Key Features:
The WWW is an information space where documents and resources are identified by
URLs. HTTP is the protocol used to access these resources.
Remote logging allows logs from different devices to be collected and stored in a
centralized location for monitoring and analysis. This is critical for security,
compliance, and troubleshooting.
Key Features:
13. Telnet
Characteristics:
FTP is a standard network protocol used for transferring files between a client and
server over a TCP-based network.
Key Features:
• Active and Passive Modes: Supports two modes for establishing connections.
• Authentication: Users can authenticate with a username and password.
• File Operations: Allows uploading, downloading, renaming, and deleting files.
15. Transmission Control Protocol (TCP)
Key Features:
UDP is a simpler, connectionless protocol that allows for fast transmission of data
without reliability checks.
Key Features:
SYN: The client sends a synchronization (SYN) packet to the server to initiate a
connection.
SYN-ACK: The server responds with a synchronization acknowledgment (SYN-
ACK) to confirm receipt of the SYN packet.
ACK: The client sends an acknowledgment (ACK) back to the server,
completing the connection setup.
Slow Start is a TCP congestion control mechanism that helps manage data
transmission rates to avoid network congestion.
• How it Works:
• TCP starts with a small congestion window (CWND) and increases it
exponentially with each acknowledgment received until it reaches a
threshold.
• Purpose: Prevents overwhelming the network by gradually ramping up the
data transmission rate.
Key Contributions:
1. Channel Signaling
• Data Link Layer: Responsible for reliable node-to-node data transfer and
framing.
• Key Services Provided:
• Framing: Divides data into manageable units called frames, adding
headers and trailers for identification.
• Error Detection: Identifies and corrects errors in transmitted frames
using techniques such as checksums or cyclic redundancy checks (CRC).
• Flow Control: Prevents a sender from overwhelming a receiver with
too much data by controlling the data rate.
• Medium Access Control (MAC): Regulates how multiple devices
access the shared communication medium to avoid collisions.
Channel Partitioning
ALOHA:
• A simple protocol where devices transmit data whenever they have it. If
a collision occurs, they wait for a random time before retrying.
• Variants:
▪ Pure ALOHA: Allows transmission at any time, leading to a high
collision probability (maximum efficiency of 18.4%).
▪ Slotted ALOHA: Time is divided into discrete slots, reducing
collisions and increasing efficiency (maximum efficiency of
36.8%).
Carrier Sense Multiple Access (CSMA):
• Devices listen to the channel before transmitting to avoid collisions.
• Variants:
▪ CSMA/CD (Collision Detection): Used in wired networks (e.g.,
Ethernet); devices detect collisions and retransmit after a
random back-off.
▪ CSMA/CA (Collision Avoidance): Used in wireless networks
(e.g., Wi-Fi); avoids collisions by using acknowledgments and
waiting.
Byte Stuffing
Bit Stuffing