Is Unit2
Is Unit2
Internet protocols
The Internet Protocol (IP) is the method or protocol by which data is sent from one
computer to another on the Internet. Each computer (known as a host) on the
Internet has at least one IP address that uniquely identifies it from all other
computers on the Internet. IP information is attached to each packet, and this
information helps routers to send packets to the right place. Every device or domain
that connects to the Internet is assigned an IP address, and as packets are directed
to the IP address attached to them, data arrives where it is needed.
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of
communication protocols used to interconnect network devices on the internet.
TCP/IP is also used as a communications protocol in a private computer network
(an intranet or extranet).
TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination. TCP/IP requires little central
management and is designed to make networks reliable with the ability to recover
automatically from the failure of any device on the network.
The two main protocols in the IP suite serve specific functions. TCP defines how
applications can create channels of communication across a network. It also manages
how a message is assembled into smaller packets before they are then transmitted
over the internet and reassembled in the right order at the destination address.
lOMoAR cPSD| 31622326
IP defines how to address and route each packet to make sure it reaches the right
destination. Each gateway computer on the network checks this IP address to
determine where to forward the message.
A subnet mask tells a computer, or other network device, what portion of the IP
address is used to represent the network and what part is used to represent hosts, or
other computers, on the network.
Collectively, the TCP/IP suite of protocols is classified as stateless, which means each
client request is considered new because it is unrelated to previous requests. Being
stateless frees up network paths so they can be used continuously.
The transport layer itself, however, is stateful. It transmits a single message, and its
connection remains in place until all the packets in a message have been received and
reassembled at the destination.
The TCP/IP model differs slightly from the seven-layer Open Systems Interconnection
(OSI) networking model designed after it. The OSI reference model defines how
applications can communicate over a network.
systems (OSes), so it can communicate with any other system. The IP suite is also
compatible with all types of computer hardware and networks.
TCP/IP is highly scalable and, as a routable protocol, can determine the most efficient
path through the network. It is widely used in current internet architecture.
IP is limited by the amount of data that it can send. The maximum size of a single IP
data packet, which contains both the header and the data, is between 20 and 24 bytes
long. This means that longer strings of data must be broken into multiple data packets
that must be independently sent and then reorganized into the correct order after they
are sent.
holistically the entire streams of data that these assets require in order to operate, and
it makes sure the entire volume of data needed is sent the first time. TCP also runs
checks that ensure the data is delivered.
As it does its work, TCP can also control the size and flow rate of data. It ensures that
networks are free of any congestion that could block the receipt of data.
An example is an application that wants to send a large amount of data over the
internet. If the application only used IP, the data would have to be broken into multiple
IP packets. This would require multiple requests to send and receive data, since IP
requests are issued per packet.
With TCP, only a single request to send an entire data stream is needed; TCP handles
the rest. Unlike IP, TCP can detect problems that arise in IP and request retransmission
of any data packets that were lost. TCP can also reorganize packets so they get
transmitted in the proper order -- and it can minimize network congestion. TCP/IP
makes data transfers over the internet easier.
The TCP header format is classified into various fields that are as follows:
lOMoAR cPSD| 31622326
● Source port
● Destination port
● Sequence number
● Acknowledgement number
● HLEN
● Control Flag Bits
● Window size
● Checksum
● Options
● Source Port
It defines the port number of the application program in the sender’s host. The source
port is 16 bits in size.
Destination Port
It defines the port number of the application program in the receiver’s host. The
destination port is 16 bits in size.
Sequence Nnmber
It conveys to the receiving host which octet in this sequence comprises the first byte in
the segment. The sequence number is a 32-bit field. TCP assigns a unique sequence
number to each byte of data contained in the TCP segment.
Acknowledgement Number
The acknowledgement number specifies the sequence number of the next octet that
the receiver expects to receive. The acknowledgement number is a 32bit field. During
the three-way handshake, the request segment is sent for connection establishment.
HLEN
This field specifies the number of 32-bit words present in the TCP header. This field
helps the receiver to know from where the actual data begins. The HLEN field is of 4
bits, and it ranges from 20 bytes to 60 bytes in tcp header size.
Control Flag Bits
The control flag bit is 6 bits. The control flag field is basically divided into the following
felids that are as follows:
● If the URG(Urgent pointer)=1, then the urgent pointer is in use otherwise, it is not
in use.
● IF ACK = 1 means the acknowledgement number is valid, and if ACK = 0 means
the segment does not contain acknowledgement.
● If PSH(Push the data without buffering) = 1 means the request to forward the
data to the application layer without buffering it.
● If RST = 1 means it abruptly resets the connection whenever there is a host crash
or is sometimes used to reject a segment.
lOMoAR cPSD| 31622326
Window Size
It tells how many bytes may be sent, starting at the acknowledged byte. It advertises
how much data (in bytes) the sender can receive without acknowledgement. Thus, the
window size is used for Flow Control.
Checksum
The checksum is used for error detection. It checksums the data, header, and pseudo-
header. The sender adds CRC checksum to the checksum field before sending the
data. The receiver rejects the data that fails the CRC check.
Options
The options field is used for several purposes. The options field contains 40 bytes of
information. Some widely used options are:
IP header includes many relevant information including Version Number, which, in this
context, is 4. Other details are as follows −
● Version − Version no. of Internet Protocol used (e.g. IPv4).
● IHL − Internet Header Length; Length of entire IP header.
● DSCP − Differentiated Services Code Point; this is Type of Service.
● ECN − Explicit Congestion Notification; It carries information about the
congestion seen in the route.
● Total Length − Length of entire IP Packet (including IP header and IP Payload).
● Identification − If IP packet is fragmented during the transmission, all the
fragments contain same identification number. to identify original IP packet they
belong to.
● Flags − As required by the network resources, if IP Packet is too large to handle,
these ‘flags’ tells if they can be fragmented or not. In this 3-bit flag, the MSB is
always set to ‘0’.
● Fragment Offset − This offset tells the exact position of the fragment in the
original IP Packet.
● Time to Live − To avoid looping in the network, every packet is sent with some
TTL value set, which tells the network how many routers (hops) this packet can
lOMoAR cPSD| 31622326
cross. At each hop, its value is decremented by one and when the value reaches
zero, the packet is discarded.
● Protocol − Tells the Network layer at the destination host, to which Protocol this
packet belongs to, i.e. the next level Protocol. For example protocol number of
ICMP is 1, TCP is 6 and UDP is 17.
● Header Checksum − This field is used to keep checksum value of entire header
which is then used to check if the packet is received error-free.
● Source Address − 32-bit address of the Sender (or source) of the packet.
● Destination Address − 32-bit address of the Receiver (or destination) of the
packet.
● Options − This is optional field, which is used if the value of IHL is greater than 5.
These options may contain values for options such as Security, Record Route,
Time Stamp, etc.
IPv4 - Addressing
IPv4 supports three different types of addressing modes. −
Unicast Addressing Mode
In this mode, data is sent only to one destined host. The Destination Address field
contains 32- bit IP address of the destination host. Here the client sends data to the
targeted server −
In this mode, the packet is addressed to all the hosts in a network segment. The
Destination Address field contains a special broadcast address, i.e. 255.255.255.255.
When a host sees this packet on the network, it is bound to process it. Here the client
sends a packet, which is entertained by all the Servers −
lOMoAR cPSD| 31622326
Here a server sends packets which are entertained by more than one servers. Every
network has one IP address reserved for the Network Number which represents the
network and one IP address reserved for the Broadcast Address, which represents all
the hosts in that network.
Hierarchical Addressing Scheme
lOMoAR cPSD| 31622326
A single IP address can contain information about the network and its sub-network and
ultimately the host. This scheme enables the IP Address to be hierarchical where a
network can have many sub-networks which in turn can have many hosts.
Subnet Mask
The 32-bit IP address contains information about the host and its network. It is very
necessary to distinguish both. For this, routers use Subnet Mask, which is as long as
the size of the network address in the IP address. Subnet Mask is also 32 bits long. If
the IP address in binary is ANDed with its Subnet Mask, the result yields the Network
address. For example, say the IP Address is 192.168.1.152 and the Subnet Mask is
255.255.255.0 then −
This way the Subnet Mask helps extract the Network ID and the Host from an IP
Address. It can be identified now that 192.168.1.0 is the Network number and
192.168.1.152 is the host on that network.
Binary Representation
The positional value method is the simplest form of converting binary from decimal
value. IP address is 32 bit value which is divided into 4 octets. A binary octet contains 8
bits and the value of each bit can be determined by the position of bit value '1' in the
octet.
Positional value of bits is determined by 2 raised to power (position – 1), that is the
value of a bit 1 at position 6 is 2^(6-1) that is 2^5 that is 32. The total value of the octet
is determined by adding up the positional value of bits. The value of 11000000 is
128+64 = 192. Some examples are shown in the table below −
lOMoAR cPSD| 31622326
The number of networks and the number of hosts per class can be derived by this
formula −
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range
127.x.x.x is reserved for loopback IP addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A
addressing can have 126 networks (27-2) and 16777214 hosts (224-2).
Class B Address
An IP address which belongs to class B has the first two bits in the first octet set to 10,
i.e.
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for
Class B is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is −
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask
for Class C is 255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a
range of −
Ipv6:
IPv6 is a 128-bits address having an address space of 2128, which is way bigger than
IPv4. IPv6 use Hexa-Decimal format separated by colon (:) .
Features of ipv6
IPv6’s header has been simplified by moving all unnecessary information and
options (which are present in IPv4 header) to the end of the IPv6 header. IPv6
header is only twice as bigger than IPv4 providing the fact the IPv6 address is
four times longer.
● End-to-end Connectivity:
Every system now has unique IP address and can traverse through the internet
without using NAT or other translating components. After IPv6 is fully
implemented, every host can directly reach other host on the Internet, with
some limitations involved like Firewall, Organization’s policies, etc.
● Auto-configuration:
IPv6 supports both stateful and stateless auto configuration mode of its host
devices. This way absence of a DHCP server does not put halt on inter segment
communication.
● Faster Forwarding/Routing:
Simplified header puts all unnecessary information at the end of the header. All
information in first part of the header are adequate for a Router to take routing
decision thus making routing decision as quickly as looking at the mandatory
header.
● IPSec:
Initially it was decided for IPv6 to must have IPSec security, making it more
secure than IPv4. This feature has now been made optional.
● No Broadcast:
Though Ethernet/Token Ring are considered as broadcast network because they
support Broadcasting, IPv6 does not have any Broadcast support anymore left
with it. It uses multicast to communicate with multiple hosts.
● Anycast Support:
This is another characteristic of IPv6. IPv6 has introduced Anycast mode of
packet routing. In this mode, multiple interfaces over the Internet are assigned
same Anycast IP address. Routers, while routing, sends the packet to the
nearest destination.
● Mobility:
IPv6 was designed keeping mobility feature in mind. This feature enables hosts
(such as mobile phone) to roam around in different geographical area and
remain connected with same IP address. IPv6 mobility feature takes advantage
of auto IP configuration and Extension headers.
● Enhanced Priority support:
Where IPv4 used 6 bits DSCP (Differential Service Code Point) and 2 bits ECN
(Explicit Congestion Notification) to provide Quality of Service but it could only
be used if the end-to-end devices support it, that is, the source and destination
device and underlying network must support it.
In IPv6, Traffic class and Flow label are used to tell underlying routers how to
efficiently process the packet and route it.
lOMoAR cPSD| 31622326
● Smooth Transition:
Large IP address scheme in IPv6 enables to allocate devices with globally
unique IP addresses. This assures that mechanism to save IP addresses such as
NAT is not required. So devices can send/receive data between each other, for
example VoIP and/or any streaming media can be used much efficiently.
Other fact is, the header is less loaded so routers can make forwarding decision
and forward them as quickly as they arrive.
● Extensibility:
One of the major advantage of IPv6 header is that it is extensible to add more
information in the option part. IPv4 provides only 40-bytes for options whereas
options in IPv6 can be as much as the size of IPv6 packet itself.
Addressing Modes
In computer networking, addressing mode refers to the mechanism how we address a
host on the network. IPv6 offers several types of modes by which a single host can be
addressed, more than one host can be addressed at once or the host at closest
distance can be addressed.
Unicast
In unicast mode of addressing, an IPv6 interface (host) is uniquely identified in a
network segment. The IPv6 packet contains both source and destination IP addresses.
A host interface is equipped with an IP address which is unique in that network
segment. A network switch or router when receives a unicast IP packet, destined to
single host, sends out to one of its outgoing interface which connects to that particular
host.
Multicast
The IPv6 multicast mode is same as that of IPv4. The packet destined to multiple hosts
is sent on a special multicast address. All hosts interested in that multicast
information, need to join that multicast group first. All interfaces which have joined the
group receive the multicast packet and process it, while other hosts not interested in
multicast packets ignore the multicast information.
Address Types
Hexadecimal Number System
Before introducing IPv6 Address format, we shall look into Hexadecimal Number
System. Hexadecimal is positional number system which uses radix (base) of 16. To
represent the values in readable format, this system uses 0-9 symbols to represent
values from zero to nine and A-F symbol to represent values from ten to fifteen. Every
digit in Hexadecimal can represent values from 0 to 15.
For example, the below is 128 bit IPv6 address represented in binary format and
divided into eight 16-bits blocks:
0010000000000001 0000000000000000 0011001000110100 1101111111100001
0000000001100011 0000000000000000 0000000000000000 1111111011111011
Each block is then converted into Hexadecimal and separated by ‘:’ symbol:
2001:0000:3238:DFE1:0063:0000:0000:FEFB
Even after converting into Hexadecimal format, IPv6 address remains long. IPv6
provides some rules to shorten the address. These rules are:
In Block 5, 0063, the leading two 0s can be omitted, such as (5th block):
2001:0000:3238:DFE1:63:0000:0000:FEFB
Rule:2 If two of more blocks contains consecutive zeroes, omit them all and replace
with double colon sign ::, such as (6th and 7th block):
2001:0000:3238:DFE1:63::FEFB
Consecutive blocks of zeroes can be replaced only once by :: so if there are still blocks
of zeroes in the address they can be shrink down to single zero, such as (2nd block):
2001:0:3238:DFE1:63::FEFB
Interface ID
IPv6 has three different type of Unicast Address scheme. The second half of the
address (last 64 bits) is always used for Interface ID. MAC address of a system is
composed of 48-bits and represented in Hexadecimal. MAC address is considered to
be uniquely assigned worldwide. Interface ID takes advantage of this uniqueness of
MAC addresses. A host can auto-configure its Interface ID by using IEEE’s Extended
Unique Identifier (EUI-64) format. First, a Host divides its own MAC address into two
24-bits halves. Then 16-bit Hex value 0xFFFE is sandwiched into those two halves of
MAC address, resulting in 64-bit Interface ID.
lOMoAR cPSD| 31622326
[Image: EUI-64
Interface ID]
Global Unicast Address
This address type is equivalent to IPv4’s public address. Global Unicast addresses in
IPv6 are globally identifiable and uniquely addressable.
Special Addresses
Version 6 has slightly complex structure of IP address than that of IPv4. IPv6 has
reserved few addresses and address notations for special purposes. See the table
below:
Special Addresses:
lOMoAR cPSD| 31622326
● The above table shows reserved multicast addresses used by interior routing
protocol.
● All addresses are reserved in similar IPv4 fashion
Reserved Multicast Address for Routers/Node:
● These addresses helps routers and hosts to speak to available routers and hosts
on a segment without being configured with an IPv6 address. Hosts use EUI-64
based auto-configuration to self-configure an IPv6 address and then speaks to
available hosts/routers on the segment by means of these addresses.
Headers
The wonder of IPv6 lies in its header. IPv6 address is 4 times larger than IPv4 but the
IPv6 header is only 2 times larger than that of IPv4. IPv6 headers have one Fixed
Header and zero or more Optional (Extension) Headers. All necessary information
which is essential for a router is kept in Fixed Header. Extension Header contains
optional information which helps routers to understand how to handle a packet/flow.
Fixed Header
lOMoAR cPSD| 31622326
1 Version (4-bits): This represents the version of Internet Protocol, i.e. 0110.
Traffic Class (8-bits): These 8 bits are divided into two parts. Most significant 6 bits are use
2 Service, which tells the Router what services should be provided to this packet. Least signif
used for Explicit Congestion Notification (ECN).
Flow Label (20-bits): This label is used to maintain the sequential flow of the packets belon
communication. The source labels the sequence which helps the router to identify that this
3
belongs to a specific flow of information. This field helps to avoid re-ordering of data packet
designed for streaming/real-time media.
Payload Length (16-bits): This field is used to tell the routers how much information this pa
in its payload. Payload is composed of Extension Headers and Upper Layer data. With 16 bi
4
bytes can be indicated but if Extension Headers contain Hop-by-Hop Extension Header than
exceed 65535 bytes and this field is set to 0.
Next Header (8-bits): This field is used to indicate either the type of Extension Header, or if
5 Header is not present then it indicates the Upper Layer PDU. The values for the type of Uppe
same as IPv4’s.
Hop Limit (8-bits): This field is used to stop packet to loop in the network infinitely. This is s
6 IPv4. The value of Hop Limit field is decremented by 1 as it passes a link (router/hop). When
reaches 0 the packet is discarded.
7 Source Address (128-bits): This field indicates the address of originator of the packet.
8 Destination Address (128-bits): This field provides the address of intended recipient of the
Extension Headers
lOMoAR cPSD| 31622326
In IPv6, the Fixed Header contains only information which is necessary and avoiding
information which is either not required or is rarely used. All such information, is put
between the Fixed Header and Upper layer header in the form of Extension Headers.
Each Extension Header is identified by a distinct value.
When Extension Headers are used, IPv6 Fixed Header’s Next Header field points to the
first Extension Header. If there is one more Extension Header, then first Extension
Header’s ‘Next-Header’ field point to the second one, and so on. The last Extension
Header’s ‘Next-Header’ field point to Upper Layer Header. Thus all headers from point
to the next one in a linked list manner.
If the Next Header field contains value 59, it indicates that there’s no header after this
header, not even Upper Layer Header.
The following Extension Headers must be supported as per RFC 2460:
These headers:
● 1. Should be processed by First and subsequent destinations.
● 2. Should be processed by Final Destination.
Extension Headers are arranged one after another in a Linked list manner, as depicted
in the diagram below:
lOMoAR cPSD| 31622326
Types of components
lOMoAR cPSD| 31622326
Hardware networking components are physical devices that make up the network.
Depending on the type of network you can have different components for each
network. Below are some of the main hardware network components that you find in
almost all types of networks.
Router
A network router is a device that is used to connect to different types of networks that
use different protocols. It is mostly used to link Local networks (LAN) to Wide Area
Networks (WAN) specifically the Internet. Its other function is to route the message
using the best and fast route to the destination.
When a user within a LAN sends an email, for example, the router checks the
destination and forwards the message using the best path. Routers mostly are linked
to an internet service provider who connects the user to the internet and the world.
Networking switch
A network switch is a device that acts as an interconnection point for different devices
within the same network. It is mostly used to create a star topology type of connection
within a room or building. It has multiple ports depending on its size to connect
devices.
Their main purpose is to act as a central connection point for other networking devices
on the network. When it receives a message it decodes it and sends it directly to the
addressed device instead of broadcasting to all other devices. This feature makes it an
intelligent switch or hub.
There are different types of network switches such as managed and those that are not
managed.
Networking Hub
Just like a network switch, hubs are used as a central point of connection for other
networking devices. However, unlike the switch when they get the message they
broadcast it to all other devices connected to it.
lOMoAR cPSD| 31622326
This leaves all other devices to decide if the message was met for them or not. This can
congest the network. Different types of hubs are active and passive hubs.
A server computer is a powerful computer within the network that is used to manage
devices, users, and applications within a network. For a small network, you don’t
require a server computer. However, in a business setup, a server may be necessary.
The hardware server computer can be used for different roles within the network such
as web server, application server, and file server among others. You can read this other
article on different types of server computers. Again here are our recommended
physical computer servers for small businesses that we recommend.
MODEM (MODulation/DEModulation)
The term MODEM is derived from the function of the device which is to modulate and
demodulate. Modems are to convert digital signals that computers produce into
analog signals that can be transferred over the telephone line process called
modulation.
When the data reach the destination it is converted from analog signals back to digital
signals that the computer can use a process called demodulation.
In earlier devices, they used to come as separate device but today they are integrated
within the networking devices that require those capabilities.
This is a network component that is integrated within the network device that is a
connection point between the device and network media such as cable.
The NIC can be wired or wireless. Wired NICs have ports to connect to the cable
either ethernet, coaxial, or fiber cables. Wireless NIC has antennas that can be used to
receive and broadcast wireless signals.
We have an article on the function, types, and uses of network interface cards you can
read for more details.
Repeater
Just as the name suggests, it is used to regenerate the signal and retransmit it.
lOMoAR cPSD| 31622326
Transmission media. When signals are transmitted over a long distance they tend to
get weak.
A repeater is positioned in the middle so that it receives the signal, boosts them, and
then retransmitted to the destination. Most hubs and switches act as repeaters.
Bridge
They are used to split a large network into smaller manageable networks. Instead of
managing 200 computers with one big network bridge can be used to break it down
into 2 networks of 100 by 100 computers.
The two networks are still within the same LAN but now they can be managed as if they
are totally different networks. This makes it simple to manage and troubleshoot
network problems.
Endpoint devices
These are devices that are connected to the network for communication and sharing
resources. The devices are mostly different types of personal computers. They include
desktop computers, printers, laptops, smartphones, tablets, or any other devices
connected to the network.
The devices can access the network either using a wired network or wireless
depending on the organization’s policies.
Gateway
This is a device that is mostly used to link to networks that use different protocols for
communication. They are gatekeepers when the message needs to get in or out of the
network. Mostly routers act as network gateways.
Networking media
Signals require a mode of traveling from one device to another hence media.
Networking media are categorized into 2 types wired/corded and wireless/cordless.
Wired types of media are copper telephone cables, coaxial, twisted pair, and fiber
optic cables. For wireless, we have technologies such as radio frequency, infrared, and
microwave.
lOMoAR cPSD| 31622326
Firewall
Modulation techniques:
Modulation can be digital or analog. Input wave of analog scheme varies continuously
like a sine wave. Voice is sampled at some rate then compressed and turned into a bit-
stream then superimposed on the carrier signal, in digital modulation. This all happens
because the communication systems have used a powerful and beautiful technique
called Modulation.
Modulation:
Types of modulation:
Amplitude Modulation
Frequency Modulation
3. Phase modulation: It is a type of modulation in which the phase of the carrier signal
is varied to represent the data being added to the signal. Different information values
are represented by different phases. For example: ‘1’ may be represented by 0° while ‘0’
by 180°.
Phase Modulation
case it is quite impossible to set up an antenna of that size. So, by using the
modulation technique the size of the antenna is reduced.
● Wireless communication: Modulation provides a wireless connection to
transmit the signals to a longer distance. Earlier we used wire systems (like
the telephone) to transfer information with the help of telephonic wires but it
was not possible to spread the wires all over the world for communication. By
using the modulation technique, the cost of wire is saved and even
information can be transferred to longer distances faster.
Working of Modulation:
Information/data can be added to the carrier signal by varying its amplitude, frequency,
and phase. Basically, modulation is applied to electromagnetic signals like radio waves,
optics, and computer networks. It can also be applied to direct current that can be
treated as a degenerate carrier wave with a fixed amplitude and frequency of 0 Hz by
turning it off and on as in a digital current loop and in Morse code telegraphy.
Advantages of modulation:
Disadvantages of modulation:
Digital-to-Analog signals is the next conversion we will discuss in this chapter. These
techniques are also called as Digital Modulation techniques.
lOMoAR cPSD| 31622326
Digital Modulation provides more information capacity, high data security, quicker
system availability with great quality communication. Hence, digital modulation
techniques have a greater demand, for their capacity to convey larger amounts of data
than analog modulation techniques.
There are many types of digital modulation techniques and also their combinations,
depending upon the need. Of them all, we will discuss the prominent ones.
The amplitude of the resultant output depends upon the input data whether it should
be a zero level or a variation of positive and negative, depending upon the carrier
frequency.
The frequency of the output signal will be either high or low, depending upon the input
data applied.
The phase of the output signal gets shifted depending upon the input. These are mainly
of two types, namely Binary Phase Shift Keying BPSK and Quadrature Phase Shift
Keying QPSK, according to the number of phase shifts. The other one is Differential
Phase Shift Keying DPSK which changes the phase according to the previous value.
I nformation Technology specifies to the components that are used to store, fetch
and manipulate the information at the minimum level with the server having an
operating system. Information Technology have a wide area of applications in
education, business, health, industries, banking sector and scientific research at a
large level. With the leading advancement in information technology, it is necessary to
have the knowledge of security issues, privacy issues and main negative impacts of IT.
To deal with these issues in IT society it is important to find out the ethical issues.
Some of the major ethical issues faced by Information Technology (IT) are Trade
Secrets
7. Liability
8. Piracy
These are explained with their affects as following below:
1. Personal Privacy:
It is an important aspect of ethical issues in information technology. IT
facilitates the users having their own hardware, operating system and
software tools to access the servers that are connected to each other and to
the users by a network. Due to the distribution of the network on a large
scale, data or information transfer in a big amount takes place which leads to
the hidden chances of disclosing information and violating the privacy of any
individuals or a group. It is a major challenge for IT society and organizations
to maintain the privacy and integrity of data. Accidental disclosure to
inappropriate individuals and provisions to protect the accuracy of data also
comes in the privacy issue.
2. Access Right:
The second aspect of ethical issues in information technology is access
right. Access right becomes a high priority issue for the IT and cyberspace
with the great advancement in technology. E-commerce and Electronic
payment systems evolution on the internet heightened this issue for various
corporate organizations and government agencies. Network on the internet
cannot be made secure from unauthorized access. Generally, the intrusion
lOMoAR cPSD| 31622326
3. Harmful Actions:
Harmful actions in the computer ethics refers to the damage or negative
consequences to the IT such as loss of important information, loss of
property, loss of ownership, destruction of property and undesirable
substantial impacts. This principle of ethical conduct restricts any outsiders
from the use of information technology in manner which leads to any loss to
any of the users, employees, employers and the general public. Typically,
these actions comprises of the intentional destruction or alteration of files
and program which drives a serious loss of resources. To recover from the
harmful actions extra time and efforts are required to remove the viruses
from the computer systems.
4. Patents:
It is more difficult to deal with these types of ethical issues. A patent can
preserve the unique and secret aspect of an idea. Obtaining a patent is very
difficult as compared with obtaining a copyright. A thorough disclosure is
required with the software. The patent holder has to reveal the full details of a
program to a proficient programmer for building a program.
5. Copyright:
The information security specialists are to be familiar with necessary
concept of the copyright law. Copyright law works as a very powerful legal
tool in protecting computer software, both before a security breach and
surely after a security breach. This type of breach could be the mishandling
and misuse of data, computer programs, documentation and similar
material. In many countries, copyright legislation is amended or revised to
provide explicit laws to protect computer programs.
6. Trade Secrets:
Trade secrets is also a significant ethical issue in information technology. A
trade secret secures something of value and usefulness. This law protects
the private aspects of ideas which is known only to the discover or his
confidants. Once disclosed, trade secret is lost as such and is only protected
by the law for trade secrets. The application of trade secret law is very broad
in the computer range, where even a slight head start in the advancement of
software or hardware can provide a significant competitive influence.
lOMoAR cPSD| 31622326
7. Liability:
One should be aware of the liability issue in making ethical decisions.
Software developer makes promises and assertions to the user about the
nature and quality of the product that can be restricted as an express
warranty. Programmers or retailers possess the legitimate to determine the
express warranties. Thus they have to be practical when they define any
claims and predictions about the capacities, quality and nature of their
software or hardware. Every word they say about their product may be as
legally valid as stated in written. All agreements should be in writing to
protect against liability. A disclaimer of express warranties can free a
supplier from being held responsible of informal, speculative statements or
forecasting made during the agreement stages.
8. Piracy:
Piracy is an activity in which the creation of illegal copy of the software is
made. It is entirely up to the owner of the software as to whether or not users
can make backup copies of their software. As laws made for copyright
protection are evolving, also legislation that would stop unauthorized
duplication of software is in consideration. The software industry is prepared
to do encounter against software piracy. The courts are dealing with an
increasing number of actions concerning the protection of software.
● Laws
o Rules that mandate or prohibit certain behavior
o Drawn from ethics
● Ethics
o Define socially acceptable behaviors
● Key difference
o Laws carry the authority of a governing body
o Ethics do not carry the authority of a governing body
▪ Based on cultural mores ´ Fixed moral attitudes or customs
o Some ethics standards are universal
● Liability
o Legal obligation of organization
lOMoAR cPSD| 31622326
● Policies
o Guidelines that describe acceptable and unacceptable employee
behaviors
o Functions as organizational laws
o Has penalties, judicial practices, and sanctions
● Difference between policy and law
o Ignorance of policy is acceptable
o Ignorance of law is unacceptable
● Keys for a policy to be enforceable
o Dissemination
o Review
o Comprehension
o Compliance
o Uniform enforcement
● Overall goal
o Simplify the acquisition of information for law enforcement agencies in
certain types of international crime
The information security risks facing an organization will vary with the feature of the
processing implemented by the organization and the sensitivity of the data processed.
An understanding of risk and the software of risk assessment methodology is important
to being able to efficiently and effectively make a secure computing environment.
It is the procedure of identifying vulnerabilities and threats to the data resources used by
an organization in implementing business objectives, and determining what
countermeasures, if some take in decreasing risk to an acceptable level, depends on the
value of the data resource to the organization. Successful risk management needs the
difficulty of all levels of employers of an organization.
This holistic method to handling risk is defined as enterprise risk management because
of its emphasis on anticipating and understanding risk across an organization. Moreover
a focus on inside and outside threats, enterprise risk management (ERM) emphasizes the
importance of handling positive risk.
Positive risks are opportunities that can enhance business value or, conversely, damage
an organization if not taken. Indeed, the objective of risk management program is not to
remove all risk but to preserve and add to enterprise value by creating smart risk
decisions.
lOMoARcPSD|31622
SECURITY REQUIREMENTS TO E-COMMERCE
a) Client Threats
Until the introduction of executable web content, Web pages were mainly static.
Coded in HTML, static pages could do little more than display content and provide
links to related pages with additional information. However, the widespread use of
active content has changed this perception.
ii. Malicious codes: Computer viruses, worms and Trojan horses are examples
of malicious code. A Trojan horse is a program which appears to perform a
useful function, but performs an unexpected action. Virus is a code segment
which replicates by attaching copies to existing executables.
lOMoAR cPSD| 31622326
ii. Integrity threats: An integrity threat exists when an unauthorized party can alter
a message stream of information. Unprotected banking transactions are
subject to integrity violations.Cyber vandalism is an example of an integrity
violation. Cyber vandalism is the electronic defacing of an existing website
page. Masquerading or spoofing – pretending to be someone you are not or
representing a website as an original when it really is a fake.
lOMoAR cPSD| 31622326
Integrity threats can alter vital financial, medical, or military information. It can have
very serious consequences for businesses and people.
iii. Availability threats: The purpose of availability threats, also known as delay or
denial threats, is to disrupt normal computer processing or to deny processing
entirely. For example, if the processing speed of a single ATM machine
transaction slows from one or two seconds to 30 seconds, users will abandon
ATM machines entirely. Similarly, slowing any internet service will drive
customers to competitors‘ web or commerce sites.
c) Server threats
The server is the third link in the client-internet-server trio embodying the e-commerce
path between the user and a commerce server. Servers have vulnerabilities that can
be exploited by anyone determined to cause destruction or to illegally acquire
information.
ii. Commerce server threats: Several pieces of software comprise the commerce
server software suite, including an FTP server, a mail server, a remote login
server and operating systems on host machines. Each of this software can have
security holes and bugs.
lOMoAR cPSD| 31622326
iii. Database threats: E-commerce systems store user data and retrieve product
information from databases connected to the web-server. Besides product
information, databases connected to the web contain valuable and private
information that could damage a company if it were altered or disclosed. Some
databases store username/password pairs in a non-secure way. If someone
obtains user authentication information, then he or she can masquerade as a
legitimate database user and reveal private and costly information.
lOMoAR cPSD| 31622326
i. Authentication
This is the ability to say that an electronic communication (whether via email or web)
does genuinely come from who it purports to.
In online commerce the best defense against being misled by an imposter is provided
by unforgeable digital certificates from a trusted authority (such as VeriSign).
Although anyone can generate digital certificates for themselves, a trusted authority
demands real- world proof of identity and checks its validity before issuing a digital
certificate. Only certificates from trusted authorities will be automatically recognized
and trusted by the major web browser and email client software.
ii. Privacy
In online commerce, privacy is the ability to ensure that information is accessed and
changed only by authorized parties. Typically this is achieved via encryption. Sensitive
data (such as credit card details, health records, sales figures etc.) are encrypted
before being transmitted across the open internet via email or the web.
iii. Authorization
iv. Integrity
Integrity of information means ensuring that a communication received has not
been altered or tampered with. If someone is receiving sensitive information
online, he not only wants to ensure that it is coming from who he expects it to
(authentication), but also that it hasn‘t been intercepted by a hacker while in
transit and its contents altered.
v. Non-repudiation
Non-repudiation allows one to legally prove that a person has sent a specific email
or made a purchase approval from a website. In the realm of e-commerce, non-
repudiation is achieved by using digital signatures. Digital signatures which have
been issued by a trusted authority (such as VeriSign) cannot be forged and their
validity can be checked with any major email or web browser software. A digital
signature is only installed in the personal computer of its owner, who is usually
required to provide a password to make use of digital signature to encrypt or
digitally sign their communications. If a company receives a purchase order via
email which has been digitally signed, it has the same legal assurances as on
receipt of a physical signed contract.
Virtual Organization:
There are two primary types of e-commerce . One is B2B and other is B2C. You are
engaging in B2B ( business-to-business e-commerce ) when you buy products or
services for your own business. B2C( business-to-customer ) is far more common .
it occurs when you buy products online for yourself.
The process of Business transaction over internet is simple . For example consider
you want to purchase a book from a website . First you should go to the vendor web
site and select what are the items ( books ) you want to purchase with the help of
different catalog (according to your choice : fiction,no-fiction ,short story etc.) . Then
you have to select the book with the buy now option . After that you have to enter
your details for the delivery .
Typically the payment methods are debit ,credit card and online banks . payment is
the final steps of any business transaction .
Next process is Consumer Information Security and Concerns . You have to enter
all the card details / bank details (for example card number , validity etc. ) . Then it
will redirect to bank site with security ( Most of the payment sites enabled secure
socket layer — SSL security to send your confidential data )
E-Governance:
Some of the popular EDI messages used in the Government Industry include:
Electronic payments:
bank cards, mobile banking, etc. E-payments are quick and efficient, and the fund
transfer typically takes place instantly. It is a secure mode of making payments.
E-cash:
eCash is known as Electronic Cash which is a digital currency technique from which
transactions can be achieved anywhere through the internet.
● Standard cards simply extend a line of credit to their users for making
purchases, balance transfers, and/or cash advances, and they often have no
annual fee.
● Premium cards offer perks such as concierge services, airport lounge access,
special event access, and more, but they usually have higher annual fees.
● Rewards cards offer cash back, travel points, or other benefits to customers
based on how they spend.
● Balance transfer cards have low introductory interest rates and fees on
balance transfers from another credit card.
● Secured credit cards require an initial cash deposit that is held by the issuer
as collateral.
● Charge cards have no preset spending limit but often don’t allow unpaid
balances to carry over from month to month.
A debit card is a payment card that makes payments by deducting money directly
from a consumer’s checking account, rather than on-loan from a bank or card
issuer. Debit cards offer the convenience of credit cards and many of the same
consumer protections when issued by major payment processors such as Visa or
Mastercard.7
lOMoAR cPSD| 31622326
There are two types of debit cards that do not require the customer to have a
checking or savings account, in addition to one standard type.