CCN PPT Course
CCN PPT Course
Network
By : BHARATI B. SAYANKAR
A Communications Model
Source
generates data to be transmitted
Transmitter
Converts data into transmittable signals
Transmission System
Carries data
Receiver
Converts received signal into data
Destination
Takes incoming data
Bit stuffing
(a) The original data.
(b) The data as they appear on the line.
(c) The data as they are stored in receiver’s memory after
destuffing.
• Error-Correcting Codes
• Error-Detecting Codes
Two scenarios for protocol 4. (a) Normal case. (b) Abnormal case.
The notation is (seq, ack, packet number). An asterisk indicates
where a network layer accepts a packet.
Control field of
(a) An information frame.
(b) A supervisory frame.
(c) An unnumbered frame.
Collision Assumption.
10
0 CCN/VIII SEM ETRX/PT
The 802.11 MAC Sublayer
Protocol
(a) The hidden station problem.
(b) The exposed station problem.
10
1 CCN/VIII SEM ETRX/PT
The 802.11 MAC Sublayer
Protocol (2)
The use of virtual channel sensing using CSMA/CA.
10
2 CCN/VIII SEM ETRX/PT
The 802.11 MAC Sublayer
Protocol (3)
A fragment burst.
10
3 CCN/VIII SEM ETRX/PT
The 802.11 MAC Sublayer
Protocol (4)
Interframe spacing in 802.11.
10
4 CCN/VIII SEM ETRX/PT
The 802.11 Frame Structure
The 802.11 data frame.
10
5 CCN/VIII SEM ETRX/PT
802.11 Services
Distribution Services
• Association
• Disassociation
• Reassociation
• Distribution
• Integration
10
6 CCN/VIII SEM ETRX/PT
802.11 Services
Intracell Services
• Authentication
• Deauthentication
• Privacy
• Data Delivery
10
7 CCN/VIII SEM ETRX/PT
Broadband Wireless
• Comparison of 802.11 and 802.16
• The 802.16 Protocol Stack
• The 802.16 Physical Layer
• The 802.16 MAC Sublayer Protocol
• The 802.16 Frame Structure
10
8 CCN/VIII SEM ETRX/PT
The 802.16 Protocol Stack
The 802.16 Protocol Stack.
10
9 CCN/VIII SEM ETRX/PT
The 802.16 Physical Layer
The 802.16 transmission environment.
11
0 CCN/VIII SEM ETRX/PT
The 802.16 Physical Layer (2)
Frames and time slots for time division duplexing.
11
1 CCN/VIII SEM ETRX/PT
The 802.16 MAC Sublayer
Protocol
Service Classes
• Constant bit rate service
• Real-time variable bit rate service
• Non-real-time variable bit rate
service
• Best efforts service
11
2 CCN/VIII SEM ETRX/PT
The 802.16 Frame Structure
(a) A generic frame. (b) A bandwidth request
frame.
11
3 CCN/VIII SEM ETRX/PT
Bluetooth
• Bluetooth Architecture
• Bluetooth Applications
• The Bluetooth Protocol Stack
• The Bluetooth Radio Layer
• The Bluetooth Baseband Layer
• The Bluetooth L2CAP Layer
• The Bluetooth Frame Structure
11
4 CCN/VIII SEM ETRX/PT
Bluetooth Architecture
Two piconets can be connected to form a
scatternet.
11
5 CCN/VIII SEM ETRX/PT
Bluetooth Applications
The Bluetooth profiles.
11
6 CCN/VIII SEM ETRX/PT
The Bluetooth Protocol Stack
The 802.15 version of the Bluetooth protocol
architecture.
11
7 CCN/VIII SEM ETRX/PT
The Bluetooth Frame Structure
A typical Bluetooth data frame.
11
8 CCN/VIII SEM ETRX/PT
Data Link Layer Switching
• Bridges from 802.x to 802.y
• Local Internetworking
• Spanning Tree Bridges
• Remote Bridges
• Repeaters, Hubs, Bridges, Switches, Routers,
Gateways
• Virtual LANs
11
9 CCN/VIII SEM ETRX/PT
Data Link Layer Switching
Multiple LANs connected by a backbone to handle
a total load higher than the capacity of a single
LAN.
12
0 CCN/VIII SEM ETRX/PT
Bridges from 802.x to 802.y
Operation of a LAN bridge from 802.11 to 802.3.
12
1 CCN/VIII SEM ETRX/PT
Bridges from 802.x to 802.y (2)
The IEEE 802 frame formats. The drawing is not
to scale.
12
2 CCN/VIII SEM ETRX/PT
Local Internetworking
A configuration with four LANs and two bridges.
12
3 CCN/VIII SEM ETRX/PT
Spanning Tree Bridges
Two parallel transparent bridges.
12
4 CCN/VIII SEM ETRX/PT
Spanning Tree Bridges (2)
12
6 CCN/VIII SEM ETRX/PT
Repeaters, Hubs, Bridges, Switches,
Routers and Gateways
12
8 CCN/VIII SEM ETRX/PT
Virtual LANs
A building with centralized wiring using hubs and a
switch.
12
9 CCN/VIII SEM ETRX/PT
Virtual LANs (2)
13
1 CCN/VIII SEM ETRX/PT
The IEEE 802.1Q Standard (2)
The 802.3 (legacy) and 802.1Q Ethernet frame
formats.
13
2 CCN/VIII SEM ETRX/PT
Summary
• Fourier Analysis
• Bandwidth-Limited Signals
• Maximum Data Rate of a Channel
13
6 CCN/VIII SEM ETRX/PT
Bandwidth-Limited Signals
A binary signal and its root-mean-square Fourier
amplitudes.
(b) – (c) Successive approximations to the
original signal.
13
7 CCN/VIII SEM ETRX/PT
Bandwidth-Limited Signals (2)
(d) – (e) Successive approximations to the
original signal.
13
8 CCN/VIII SEM ETRX/PT
Bandwidth-Limited Signals (3)
Relation between data rate and harmonics.
13
9 CCN/VIII SEM ETRX/PT
Guided Transmission Data
• Magnetic Media
• Twisted Pair
• Coaxial Cable
• Fiber Optics
14
0 CCN/VIII SEM ETRX/PT
Twisted Pair
14
1 CCN/VIII SEM ETRX/PT
Coaxial Cable
A coaxial cable.
14
2 CCN/VIII SEM ETRX/PT
Fiber Optics
14
4 CCN/VIII SEM ETRX/PT
Fiber Cables
(a) Side view of a single fiber.
(b) End view of a sheath with three fibers.
14
5 CCN/VIII SEM ETRX/PT
Fiber Cables (2)
A comparison of semiconductor diodes and LEDs
as light sources.
14
6 CCN/VIII SEM ETRX/PT
Fiber Optic Networks
A fiber optic ring with active repeaters.
14
7 CCN/VIII SEM ETRX/PT
Fiber Optic Networks (2)
A passive star connection in a fiber optics
network.
14
8 CCN/VIII SEM ETRX/PT
Wireless Transmission
• The Electromagnetic Spectrum
• Radio Transmission
• Microwave Transmission
• Infrared and Millimeter Waves
• Lightwave Transmission
14
9 CCN/VIII SEM ETRX/PT
The Electromagnetic Spectrum
The electromagnetic spectrum and its uses for
communication.
15
0 CCN/VIII SEM ETRX/PT
Radio Transmission
(a) In the VLF, LF, and MF bands, radio waves follow the
curvature of the earth.
(b) In the HF band, they bounce off the ionosphere.
15
1 CCN/VIII SEM ETRX/PT
Politics of the Electromagnetic
Spectrum
The ISM bands in the United States.
15
2 CCN/VIII SEM ETRX/PT
Lightwave Transmission
Convection currents can interfere with laser communication
systems.
A bidirectional system with two lasers is pictured here.
15
3 CCN/VIII SEM ETRX/PT
Communication Satellites
• Geostationary Satellites
• Medium-Earth Orbit Satellites
• Low-Earth Orbit Satellites
• Satellites versus Fiber
15
4 CCN/VIII SEM ETRX/PT
Communication Satellites
15
6 CCN/VIII SEM ETRX/PT
Communication Satellites (3)
VSATs using a hub.
15
7 CCN/VIII SEM ETRX/PT
Low-Earth Orbit Satellites
Iridium
15
9 CCN/VIII SEM ETRX/PT
Public Switched Telephone
System
• Structure of the Telephone System
• The Politics of Telephones
• The Local Loop: Modems, ADSL and
Wireless
• Trunks and Multiplexing
• Switching
16
0 CCN/VIII SEM ETRX/PT
Structure of the Telephone System
16
2 CCN/VIII SEM ETRX/PT
Major Components of the
Telephone System
• Local loops
Analog twisted pairs going to houses and
businesses
• Trunks
Digital fiber optics connecting the
switching offices
• Switching offices
Where calls are moved from one trunk to
another
16
3 CCN/VIII SEM ETRX/PT
The Politics of Telephones
16
5 CCN/VIII SEM ETRX/PT
Modems
(a) QPSK.
(b) QAM-16.
(c) QAM-64.
16
7 CCN/VIII SEM ETRX/PT
Modems (3)
(a) (b)
(a) V.32 for 9600 bps.
(b) V32 bis for 14,400 bps.
16
8 CCN/VIII SEM ETRX/PT
Digital Subscriber Lines
Bandwidth versus distanced over category 3 UTP
for DSL.
16
9 CCN/VIII SEM ETRX/PT
Digital Subscriber Lines (2)
Operation of ADSL using discrete multitone
modulation.
17
0 CCN/VIII SEM ETRX/PT
Digital Subscriber Lines (3)
A typical ADSL equipment configuration.
17
1 CCN/VIII SEM ETRX/PT
Wireless Local Loops
17
2 CCN/VIII SEM ETRX/PT
Frequency Division Multiplexing
17
4 CCN/VIII SEM ETRX/PT
Time Division Multiplexing
17
5 CCN/VIII SEM ETRX/PT
Time Division Multiplexing (2)
Delta modulation.
17
6 CCN/VIII SEM ETRX/PT
Time Division Multiplexing (3)
Multiplexing T1 streams into higher carriers.
17
7 CCN/VIII SEM ETRX/PT
Time Division Multiplexing (4)
Two back-to-back SONET frames.
17
8 CCN/VIII SEM ETRX/PT
Time Division Multiplexing (5)
SONET and SDH multiplex rates.
17
9 CCN/VIII SEM ETRX/PT
Circuit Switching
18
7 CCN/VIII SEM ETRX/PT
GSM (2)
A portion of the GSM framing structure.
18
8 CCN/VIII SEM ETRX/PT
CDMA – Code Division Multiple
Access
(a) Binary chip sequences for four stations (b) Bipolar chip sequenc
(c) Six examples of transmissions (d) Recovery of station C’s signal
18
9 CCN/VIII SEM ETRX/PT
Third-Generation Mobile Phones:
Digital Voice and Data
Basic services an IMT-2000 network should
provide
19
1 CCN/VIII SEM ETRX/PT
Community Antenna Television
An early cable television system.
19
2 CCN/VIII SEM ETRX/PT
Internet over Cable
Cable television
19
3 CCN/VIII SEM ETRX/PT
Internet over Cable (2)
The fixed telephone system.
19
4 CCN/VIII SEM ETRX/PT
Spectrum Allocation
Frequency allocation in a typical
cable TV system used for Internet
access
19
5 CCN/VIII SEM ETRX/PT
Cable Modems
Typical details of the upstream and
downstream channels in North
America.
19
6 CCN/VIII SEM ETRX/PT
Computer Communication
Network
VIII Sem ETRX
G H Raisoni College Of Engg.
Hingana Nagpur
Network Security
Cryptography
Introduction to Cryptography
Substitution Ciphers
Transposition Ciphers
One-Time Pads
Two Fundamental Cryptographic
Principles
19
9 CCN/VIII SEM ETRX/PT
Need for Security
Some people who cause security problems and
why.
20
0 CCN/VIII SEM ETRX/PT
An Introduction to Cryptography
The encryption model (for a symmetric-key
cipher).
20
1 CCN/VIII SEM ETRX/PT
Transposition Ciphers
A transposition cipher.
20
2 CCN/VIII SEM ETRX/PT
One-Time Pads
An
20
example of quantum cryptography.
4 CCN/VIII SEM ETRX/PT
Symmetric-Key Algorithms
20
5 CCN/VIII SEM ETRX/PT
Product Ciphers
Basic elements of product ciphers. (a) P-box.
(b) S-box. (c) Product.
20
6 CCN/VIII SEM ETRX/PT
Data Encryption Standard
The data encryption standard. (a) General outline.
(b) Detail of one iteration. The circled + means
exclusive OR.
20
7 CCN/VIII SEM ETRX/PT
Triple DES
(a) Triple encryption using DES. (b) Decryption.
20
8 CCN/VIII SEM ETRX/PT
AES – The Advanced Encryption
Standard
Rules for AES proposals
1. The algorithm must be a symmetric block
cipher.
2. The full design must be public.
3. Key lengths of 128, 192, and 256 bits
supported.
4. Both software and hardware
implementations required
5. The algorithm must be public or licensed on
nondiscriminatory terms.
20
9 CCN/VIII SEM ETRX/PT
AES (3)
Creating of the state and rk arrays.
21
0 CCN/VIII SEM ETRX/PT
Electronic Code Book Mode
The plaintext of a file encrypted as 16 DES
blocks.
21
1 CCN/VIII SEM ETRX/PT
Cipher Block Chaining Mode
Cipher block chaining. (a) Encryption. (b)
Decryption.
21
2 CCN/VIII SEM ETRX/PT
Cipher Feedback Mode
(a) Encryption. (c) Decryption.
21
3 CCN/VIII SEM ETRX/PT
Stream Cipher Mode
A stream cipher. (a) Encryption. (b)
Decryption.
21
4 CCN/VIII SEM ETRX/PT
Counter Mode
Encryption using counter mode.
21
5 CCN/VIII SEM ETRX/PT
Cryptanalysis
Some common symmetric-key cryptographic
algorithms.
21
6 CCN/VIII SEM ETRX/PT
Public-Key Algorithms
RSA
Other Public-Key Algorithms
21
7 CCN/VIII SEM ETRX/PT
RSA
An example of the RSA algorithm.
21
8 CCN/VIII SEM ETRX/PT
Digital Signatures
Symmetric-Key Signatures
Public-Key Signatures
Message Digests
The Birthday Attack
21
9 CCN/VIII SEM ETRX/PT
Symmetric-Key Signatures
Digital signatures with Big Brother.
22
0 CCN/VIII SEM ETRX/PT
Public-Key Signatures
Digital signatures using public-key cryptography.
22
1 CCN/VIII SEM ETRX/PT
Message Digests
Digital signatures using message digests.
22
2 CCN/VIII SEM ETRX/PT
SHA-1
Use of SHA-1 and RSA for signing nonsecret
messages.
22
3 CCN/VIII SEM ETRX/PT
SHA-1 (2)
(a) A message padded out to a multiple of 512
bits.
(b) The output variables. (c) The word array.
22
4 CCN/VIII SEM ETRX/PT
Management of Public Keys
Certificates
X.509
Public Key Infrastructures
22
5 CCN/VIII SEM ETRX/PT
Problems with Public-Key
Encryption
A way for Trudy to subvert public-key
encryption.
22
6 CCN/VIII SEM ETRX/PT
Certificates
A possible certificate and its signed hash.
22
7 CCN/VIII SEM ETRX/PT
X.509
The basic fields of an X.509 certificate.
22
8 CCN/VIII SEM ETRX/PT
Public-Key Infrastructures
(a) A hierarchical PKI. (b) A chain of
certificates.
22
9 CCN/VIII SEM ETRX/PT
Communication Security
IPsec
Firewalls
Virtual Private Networks
Wireless Security
23
0 CCN/VIII SEM ETRX/PT
IPsec
The IPsec authentication header in transport
mode for IPv4.
23
1 CCN/VIII SEM ETRX/PT
IPsec (2)
(a) ESP in transport mode. (b) ESP in tunnel
mode.
23
2 CCN/VIII SEM ETRX/PT
Firewalls
A firewall consisting of two packet filters and an
application gateway.
23
3 CCN/VIII SEM ETRX/PT
Virtual Private Networks
(a) A leased-line private network. (b) A virtual
private network.
23
4 CCN/VIII SEM ETRX/PT
802.11 Security
Packet encryption using WEP.
23
5 CCN/VIII SEM ETRX/PT
Authentication Protocols
Authentication Based on a Shared
Secret Key
Establishing a Shared Key: Diffie-
Hellman
Authentication Using a Key Distribution
Center
Authentication Using Kerberos
Authentication Using Public-Key
Cryptography
23
6 CCN/VIII SEM ETRX/PT
Authentication Based on a Shared Secret
Key
23
8 CCN/VIII SEM ETRX/PT
Authentication Based on a Shared Secret Key
(3)
The reflection attack.
23
9 CCN/VIII SEM ETRX/PT
Authentication Based on a Shared Secret Key
(4)
24
0 CCN/VIII SEM ETRX/PT
Authentication Based on a Shared Secret Key
(5)
Authentication using HMACs.
24
1 CCN/VIII SEM ETRX/PT
Establishing a Shared Key:
The Diffie-Hellman Key Exchange
The Diffie-Hellman key exchange.
24
2 CCN/VIII SEM ETRX/PT
Establishing a Shared Key:
The Diffie-Hellman Key Exchange
The bucket brigade or man-in-the-middle attack.
24
3 CCN/VIII SEM ETRX/PT
Authentication Using a Key Distribution
Center
A first attempt at an authentication protocol
using a KDC.
24
4 CCN/VIII SEM ETRX/PT
Authentication Using a Key Distribution Center
(2)
The Needham-Schroeder authentication
protocol.
24
5 CCN/VIII SEM ETRX/PT
Authentication Using a Key Distribution Center
(3)
The Otway-Rees authentication protocol (slightly
simplified).
24
6 CCN/VIII SEM ETRX/PT
Authentication Using Kerberos
The operation of Kerberos V4.
24
7 CCN/VIII SEM ETRX/PT
Authentication Using Public-Key
Cryptography
Mutual authentication using public-key
cryptography.
24
8 CCN/VIII SEM ETRX/PT
E-Mail Security
PGP – Pretty Good Privacy
PEM – Privacy Enhanced
Mail
S/MIME
24
9 CCN/VIII SEM ETRX/PT
PGP – Pretty Good Privacy
PGP in operation for sending a message.
25
0 CCN/VIII SEM ETRX/PT
PGP – Pretty Good Privacy (2)
A PGP message.
25
1 CCN/VIII SEM ETRX/PT
Web Security
Threats
Secure Naming
SSL – The Secure Sockets
Layer
Mobile Code Security
25
2 CCN/VIII SEM ETRX/PT
Secure Naming
(a) Normal situation. (b) An attack
based on breaking into DNS and
modifying Bob's record.
25
3 CCN/VIII SEM ETRX/PT
Secure Naming (2)
How Trudy spoofs Alice's ISP.
25
4 CCN/VIII SEM ETRX/PT
Secure DNS
25
6 CCN/VIII SEM ETRX/PT
SSL—The Secure Sockets Layer
Layers (and protocols) for a home user
browsing with SSL.
25
7 CCN/VIII SEM ETRX/PT
SSL (2)
A simplified version of the SSL connection
establishment subprotocol.
25
8 CCN/VIII SEM ETRX/PT
SSL (3)
Data
25
transmission using SSL.
9 CCN/VIII SEM ETRX/PT
Java Applet Security
Applets inserted into a Java Virtual
Machine interpreter inside the
browser.
26
0 CCN/VIII SEM ETRX/PT
Social Issues
Privacy
Freedom of Speech
Copyright
26
1 CCN/VIII SEM ETRX/PT
Anonymous Remailers
Users who wish anonymity chain
requests through multiple
anonymous remailers.
26
2 CCN/VIII SEM ETRX/PT
Freedom of Speech
Possibly banned material:
1. Material inappropriate for children or teenagers.
2. Hate aimed at various ethnic, religious, sexual, or
other groups.
3. Information about democracy and democratic
values.
4. Accounts of historical events contradicting the
government's version.
5. Manuals for picking locks, building weapons,
encrypting messages, etc.
26
3 CCN/VIII SEM ETRX/PT
Steganography
(a) Three zebras and a tree. (b) Three
zebras, a tree, and the complete text of
five plays by William Shakespeare.
26
4 CCN/VIII SEM ETRX/PT