CSC 323 - Computer Networks Lecture Note
CSC 323 - Computer Networks Lecture Note
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
2
CSC 323 – Computer Networks
Most people know the Internet through its applications: the World Wide Web, email,
streaming audio and video, chat rooms, and music (file) sharing. The Web, for example,
presents an intuitively simple interface.
Although not yet as common as surfing the Web, another emerging application of the Internet
is streaming audio and video. Though an entire video file could first be fetched from a remote
machine and then played on the local machine, similar to the process of downloading and
displaying a Web page, this would entail waiting for the last second of the video file to be
delivered before starting to look at it. Streaming video implies that the sender and the receiver
are, respectively, the source and the sink for the video stream. That is, the source generates a
video stream (perhaps using a video capture card), sends it across the Internet in messages,
and the sink displays the stream as it arrives.
To be more precise, video is not an application; it is a type of data. One example of a video
application is video-on-demand, which reads a pre-existing movie from disk and transmits it
over the network. Another kind of application is videoconferencing, which is actually the
more interesting case because it has very tight timing constraints. Just as when using the
telephone, the interactions among the participants must be timely. When a person at one end
gestures, then that action must be displayed at the other end as quickly as possible. Too much
delay makes the system unusable. In contrast, if it takes several seconds from the time the
user starts the video until the first image is displayed, then the service is still deemed
satisfactory. Also, interactive video usually implies that video is flowing in both directions,
while a video-on-demand application is most likely sending video in only one direction.
2. Accuracy: The system must deliver the data accurately. Data have been altered in
transmission and left uncorrected are unusable.
3
CSC 323 – Computer Networks
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless.
In the case of video, audio and voice data, timely delivery means delivery data as they are
produced, in the same order that they are produced, and without significant delay. This kind
of delivery is called real-time transmission.
2. Sender: is the device that sends the data message. It can be a computer, workstation,
telephone handset, video camera, and so on.
3. Receiver: is the device that receives the message. It can be a computer, workstation,
telephone handset, television and so on.
4. Transmission Medium: is the path through which a message travels from sender to
receiver. It could be a twisted-pair wire, coaxial cable, fiber-optic cable, or radio
waves
4
CSC 323 – Computer Networks
Distortion
Distortion is known as the alternation of the original signal. This may happen due to the
properties of the medium. There are many types of distortions such as amplitude distortion,
harmonic distortion and attenuation distortion.
Attenuation distortion, when a signal is transmitted over a network system, attenuation occurs
due to energy loss and delay due to the distance travelled. If the output signal is to be
undistorted, the system must have constant gain and delay for every frequency component. If
this does not occur, then this is termed “Attenuation Distortion”.
Noise
Noise is an unwanted random signal that is added (superposition) to a signal. Noise is added
on signals due to many natural reasons when it is travelling through a medium. Noise can
randomly fluctuate the signals, and it disturbs the process of revealing the information sent
through a signal.
Noise can occur due to natural or artificial reasons, and can be generated either internally or
externally as a result of interference. There are many types of noise such as thermal noise,
which is due to the thermal energy agitation of electrons, this produces energy which is
uniformly distributed over the frequency spectrum and therefore has been given the name
“White Noise”, others are shot noise, flicker noise, burst noise. Some of the noise is
unavoidable, and only the effect of them on signal can be minimized.
5
CSC 323 – Computer Networks
Effect of the noise on a signal is measured using a parameter known as signal to noise (S/N)
ratio (SNR). If the S/N ratio is small, effect of the noise is higher. If the S/N ratio is less than
one and very low, revealing the information held in the signal is difficult.
Modulation
Modulation is defined as the process by which some characteristics, usually amplitude,
frequency or phase, of a carrier is varied in accordance with instantaneous value of
some other voltage, called the modulating voltage.
The term carrier is applied to the voltage whose characteristic is varied and the term
modulating voltage (signal) is used for the voltage in accordance with which the variation is
made.
The modulation is therefore the process of up shifting the message frequency to a range more
useful for transmission
Need For Modulation
1. If two musical programs were played at the same time within distance, it would be
difficult for anyone to listen to one source and not hear the second source. Since all
musical sounds have approximately the same frequency range, from about 50 Hz to
10KHz. If a desired program is shifted up to a band of frequencies between 100KHz
and 110KHz, and the second program shifted up to the band between 120KHz and
130KHz, Then both programs gave still 10KHz bandwidth and the listener can (by
band selection) retrieve the program of his own choice. The receiver would down shift
only the selected band of frequencies to a suitable range of 50Hz to 10KHz.
2. A second more technical reason to shift the message signal to a higher frequency is
related to antenna size. It is to be noted that the antenna size is inversely proportional to
the frequency to be radiated. This is 75 meters at 1 MHz but at 15KHz it has increased
to 5000 meters (or just over 16,000 feet) a vertical antenna of this size is impossible.
3. The third reason for modulating a high frequency carrier is that RF (radio frequency)
energy will travel a great distance than the same amount of energy transmitted as sound
power.
Types of Modulation
The carrier signal is a sine wave at the carrier frequency. Below equation shows that the sine
wave has three characteristics that can be altered:
The terms that may be varied are the carrier voltage Ec, the carrier frequency fc, and the
carrier phase angle θ. So three forms of modulations are possible:
1. Amplitude Modulation
Amplitude modulation is an increase or decrease of the carrier voltage (Ec), with all
other factors remaining constant.
Amplitude Modulation (AM) is the process in which the amplitude of the Carrier signal is
varied in accordance with the information Signal. If the un-modulated carrier signal is
represented by
6
CSC 323 – Computer Networks
A sin2pfc t
B sin2pfa t
Where,
fc=Carrier frequency
A= Maximum value of un-modulated signal
fa= Frequency of the modulating signal
B= Maximum value of the un-modulated signal.
p = Pi
The carrier signal, modulating signal and the modulated signal is shown in the below fig.
Factoring, we get
2. Frequency Modulation
Frequency modulation is a change in the carrier frequency (fc) with all other factors
remaining constant.
Frequency Modulation is the process in which the frequency of the carrier signal is varied by
the modulating signal while the amplitude remains constant.
7
CSC 323 – Computer Networks
The big advantage of frequency modulation is its noise reduction ability, because most of
noise is appeared as additional amplitude and in FM the amplitude of signal is hold fixed.
If the un-modulated carrier signal is represented by A sin2pf t and the modulating signal is
represented by B sin2pfa t.
Then the carrier frequency “f” will be changed around the resulting frequency fc thus
f = fc + Df Sin2pfa t.
So carrier swing = 2 x Df
Making use of calculus, equation for the frequency modulated signal can be written as
The carrier signal, modulating signal and modulated signal are shown in the below fig.
3. Phase Modulation
Phase modulation is a change in the carrier phase angle (θ). The phase angle cannot
change without also affecting a change in frequency. Therefore, phase modulation is in
reality a second form of frequency modulation.
The transmission pf the voice signal by a carrier is represented as a voltage signal that varies
continuously with time. In amplitude modulation and frequency modulation; the carrier signal
is varied continuously in analogue manner; this continuous transmission of information in an
analogue manner is used in the Frequency Division Multiplex system, while in the Time
Division Multiplex system it is not necessary. The Time Division Multiplex system use pulse
8
CSC 323 – Computer Networks
modulation. In the Pulse modulation, the continuous signal is converted into a series of
pulses, each proportional to the amplitude of the signal and corresponding in time to it. Thus
in pulse modulation, a series of pulses carries the information instead of continuous
modulated signal.
The modulating signal can be used to control one characteristic of the pulses. Thus pulse
modulation has the following common methods.
Pulse Amplitude Modulation (PAM)
Pulse Width Modulation (PWM)
Pulse Frequency Modulation (PFM)
Pulse Code Modulation (PCM)
These four methods of pulse modulation are shown in Below Figures.
Multiplexing
Multiplexing is sending multiple signals or streams of information on a carrier at the same
time in the form of a single, complex signal and then recovering the separate signals at the
receiving end.
In analogue transmission, signals are commonly multiplexed using frequency-division
multiplexing (FDM), in which the carrier bandwidth is divided into sub channels of different
frequency widths, each carrying a signal at the same time in parallel.
Multiplexing is the process in which multiple Data Streams, coming from different Sources,
are combined and Transmitted over a Single Data Channel or Data Stream.
9
CSC 323 – Computer Networks
In Electronic Communications, the two basic forms of Multiplexing are Time Division
Multiplexing (TDM) and Frequency Division Multiplexing (FDM).
In Frequency Division Multiplexing, Data Streams are carried simultaneously on the same
Transmission medium by allocating to each of them a different Frequency Band within the
Bandwidth of the Single Channel.
In Time Division Multiplexing, Transmission Time on a Single Channel is divided into non-
overlapped Time Slots. Data Streams from different Sources are divided into Units with same
size and interleaved successively into the Time Slots.
The figure below shows how TDM interleaves small Units of each Data Stream into the
corresponding Time Slots. It Transmits the Data Streams from three Signal Sources (Red,
Green and Blue) simultaneously by combining them into a Single Data Stream.
10
CSC 323 – Computer Networks
Parallel Transmission
In parallel transmission, multiple bits (usually 8 bits or a byte/character) are sent
simultaneously on different channels (wires, frequency channels) within the same cable, or
radio path, and synchronized to a clock. Parallel devices have a wider data bus than serial
devices and can therefore transfer data in words of one or more bytes at a time. As a result,
there is a speedup in parallel transmission bit rate over serial transmission bit rate. However,
this speedup is a tradeoff versus cost since multiple wires cost more than a single wire, and as
a parallel cable gets longer, the synchronization timing between multiple channels becomes
more sensitive to distance. The timing for parallel transmission is provided by a constant
clocking signal sent over a separate wire within the parallel cable; thus parallel transmission
is considered synchronous.
11
CSC 323 – Computer Networks
Serial Transmission
In serial transmission, bits are sent sequentially on the same channel (wire) which reduces
costs for wire but also slows the speed of transmission. Also, for serial transmission, some
overhead time is needed since bits must be assembled and sent as a unit and then
disassembled at the receiver.
Applications
Serial transmission is between two computers or from a computer to an external device
located some distance away. Parallel transmission either takes place within a computer
system (on a computer bus) or to an external device located a close distance away.
Examples
Examples of parallel mode transmission include connections between a computer and a
printer (parallel printer port and cable). Most printers are within 6 meters or 20 feet of the
transmitting computer and the slight cost for extra wires is offset by the added speed gained
through parallel transmission of data.
12
CSC 323 – Computer Networks
Examples of serial mode transmission include connections between a computer and a modem
using the RS-232 protocol. Although an RS-232 cable can theoretically accommodate 25
wires, all but two of these wires are for overhead control signalling and not data transmission;
the two data wires perform simple serial transmission in either direction. In this case, a
computer may not be close to a modem, making the cost of parallel transmission
prohibitive—thus speed of transmission may be considered less important than the economic
advantage of serial transmission.
Tradeoffs
Serial transmission via RS-232 is officially limited to 20 Kbps for a distance of 15 meters or
50 feet. Depending on the type of media used and the amount of external interference present,
RS-232 can be transmitted at higher speeds, or over greater distances, or both. Parallel
transmission has similar distance-versus-speed tradeoffs, as well as a clocking threshold
distance. Techniques to increase the performance of serial and parallel transmission (longer
distance for same speed or higher speed for same distance) include using better transmission
media, such as fiber optics or conditioned cables, implementing repeaters, or using
shielded/multiple wires for noise immunity.
Technology
To resolve the speed and distance limitations of serial transmission via RS-232, several other
serial transmission standards have been developed including RS-449, V.35, Universal Serial
Bus (USB), and IEEE-1394 (Firewire). Each of these standards has different electrical,
mechanical, functional, and procedural characteristics. The electrical characteristics define
voltage levels and timing of voltage level changes. Mechanical characteristics define the
actual connector shape and number of wires. Common mechanical interface standards
associated with parallel transmission are the DB-25 and Centronics connectors. The
Centronics connector is a 36-pin parallel interface that also defines electrical signalling.
Functional characteristics specify the operations performed by each pin in a connector; these
can be classified into the broad categories of data, control, timing, and electrical ground. The
procedural characteristics or protocol define the sequence of operations performed by pins in
the connector.
13
CSC 323 – Computer Networks
A node can be a computer, printer, or any other device capable of sending and/or
receiving data generated by other nodes on the network.
The links connecting the devices are often called communication channels.
Most networks use distributed processing in which a task is divided among multiple
computers. Instead of a single large machine being responsible for all aspects of processes,
separate computers (usually a personal computer or workstation) handle a subset. While
access to the systems is often controlled by a combination of specific codes such as account
number and PIN.
The former method has some advantages over the later one, such as:
Distributed databases: No one system needs to provide storage capacity for the entire
database. A distributed database is a database in which the data are stored and
manipulated on more than one computer.
Faster problem solving: Multiple computers working on parts of problem concurrently
can often solve a problem faster than a single machine working alone.
For example, networks of PCs have broken encryption codes that were previously
assumed to be unbreakable (on a single computer)
Collaborative processing: Both multiple computers and multiple users can interact on a
task. For example, in multi-user network games the actions of each player are visible to
and affect all the others.
Network Criteria
A network must be able to meet a certain number of criteria. These criteria are as stated
below:
1. Performance
Performance can be measured in many ways, including
Transit time: is the amount of time required for a message to travel from one device
14
CSC 323 – Computer Networks
to another.
Response time: is the elapsed time between an inquiry and a response
Performance factors
The following factors determines the performance of typical networks
Number of users: Having a large number of concurrent users can slow response time
in a network not designed to handle heavy traffic loads.
Type of transmission medium: The medium defines the speed (data rate) at which
data can travel through a connection.
For example, 10Base-T Ethernet has a data rate of 10 Mbps while the increasingly
popular 100Base-T network can move data 10 times faster.
Hardware: The types of hardware included in a network affect both speed and
capacity of transmission.
For example, an Intel Core i5 processor with a high speed can process data faster than
the previous processor in the family.
Software: The software used to process data at the sender, receiver and intermediate
nodes also affects network performance.
Throughput: The throughput is the measurement of how fast data can pass through a
point.
2. Reliability
In addition to the accuracy of delivery, network reliability is measured by
Frequency of failure: This is defined as the number of times a network fails in a
specified period of time.
Recovery time of a network after a failure: This is defined as the time it takes to
restore service.
Catastrophe: Networks must be protected from catastrophic events such as fire,
earthquake, or theft. One protection against unforeseen damage is a reliable system to
back up network software.
3. Security
Unauthorized access: A network needs to protect sensitive data from unauthorized
access. Protection can be accomplished at a number of levels.
• At the lowest level are user identification codes or passwords.
15
CSC 323 – Computer Networks
1. Geographical Coverage
Today when we speak of networks, we are generally referring to three primary categories
based on its geographical coverage:
a) Local area networks (LANs)
b) Metropolitan area networks (MANs)
c) Wide area networks (WANs)
The category a network falls into is determined by its size, its ownership, the distance it
covers, and the physical architecture.
The reason such classifications are interesting is that the size of a network often has
implications for the underlying technology that can be used, with a key factor being the
amount of time it takes for data to propagate from one end of the network to the other.
16
CSC 323 – Computer Networks
Internetworks
When two or more networks are connected, they become an Internetworks, or internet.
The individual networks are joined into Internetworks by the use of routers.
internet vs Internet
a. The term internet (lowercase i)
It is a generic term used to mean an interconnection of networks.
2. Type of Topology
A network’s topology refers not only to the physical layout of its computers, cables, and
other resources, but also to how those components communicate with each other.
Topology, layout, diagram, and map are some of the many terms used to describe this
basic design.
a. Bus Topology
This consists of a series of computers (nodes) connected along a single cable segment. It
is also known as Linear Bus. The bus topology is by far the simplest and at one time was
the most common method for connecting computers.
Inherent in this simplicity, however, is a weakness: a single cable break can halt the entire
network, since all components of the bus topology connect via a backbone, a single cable
segment that (theoretically) interconnects all the computers in a straight line.
When a computer has data to send, it address that data, breaks it into packets, and sends it
across the network as electronic signal. These signals travel the length of the cable
segment, and all connected computers receive them. However, because of the address
given to the packets, only those computers for which these signals are destined accept the
data.
b. Star Topology
The topology of computers connected by cable segments to a central concentration point
(Hub) is called Star Topology. Because of the weakness in other topologies, the star has
become the dominant topology in today’s network.
This topology got its start in the early days of mainframe computing when all nodes were
18
CSC 323 – Computer Networks
attached to a central point, which was a front-end processor, itself attached to the
mainframe.
When a computer sends a signal, the hub receives and retransmits it down every other
cable segment to all other computers or other devices attached to that hub. All computers
hear the signal and check the destination address, but only the computer to which that
data is addressed processes the data.
c. Ring Topology
A ring configuration is one where the links or bearers are looped in and out of each node.
The usual benefit is that if any part of the ring gets broken, the network will continue to
operate. This type of configuration is most often used where high reliability is needed.
Token passing is one method for sending data around a ring. A small packet, called a
token, passes around the ring to each computer in turn. If a computer has information to
send, it modifies the token, adds address information and the data, and sends it around the
19
CSC 323 – Computer Networks
ring, that information travels around the ring until it either reaches its destination or return
to the sender.
3. Mode of Connection
This classification is further divided into two models
a. Peer-to-Peer (P2P) Connection [Distributed Networks]
b. Client-Server Connection [Centralized Networks]
The popularity of P2P service has caused P2P traffic to consume over 80% of Internet
resources from the year 2012. It has surpassed various used-to-be dominate network
applications such as ftp, web, etc.
There are various types of P2P protocol and application that are being used in Internet,
nowadays:
20
CSC 323 – Computer Networks
21
CSC 323 – Computer Networks
In some cases, the client units do not even include a local hard-drive or floppy-drive unit. The
bootup process is performed through onboard BIOS, and no data is stored at the client
machine.
Although network cables play a vital role in most networks, many different kinds of cables
may be used to build networks, each with its own distinguishing set of signal-carrying
characteristics.
However, not all computers or networked devices attach to networks by cables; a growing
portion of the networking population uses wireless technologies, either because physical
obstructions or distance limitation makes cables unsuitable or because users are mobile.
22
CSC 323 – Computer Networks
called attenuation.
3. Maximum number of segments per internetwork: Each type of cable is also subject to
latency, which measures the amount of time a signal takes to travel from one end of the
cable to another. Most networks are subject to some kind of maximum tolerable delay,
after which it is assumed signals can no longer arrive.
4. Maximum number of devices per segment: Each time a network is attached to a cable,
a phenomenon called insertion loss occurs – that is, each physical connection adds to the
attenuation of signals on a cable segment. It is therefore necessary to restrict the
maximum number of devices so the signals that traverse it are kept clean and strong
enough to remain intelligible to all devices.
5. Interference Susceptibility: Each type of cable is more or less susceptible to other
signals present in the environment; such interference may be electromagnetic or other
broadcast signals.
6. Connection hardware: Every type of cable has associated connectors that influence the
kinds of hardware to which the cable can connect and affect the cost of the resulting
network.
7. Material Costs: Each type of cable has an associated cost per unit length. This is a good
way to compare cables of the same type to one another.
Coaxial Cable
For many years, coaxial cable was the predominant form of network cabling. Relatively
inexpensive and reasonably easy to install, coaxial cable was the networker’s choice. Recent
improvements in electronics and signaling technologies conspired to knock coaxial cable off
its pedestal.
The majority of coaxial cable in use today is for carrying broadband signals for cable TV or
from a home satellite dish to the satellite receiver.
Simply put, coaxial cable consists of a single conductor at the core, surrounded by an
insulating layer, braided metal shielding , and an outer cover (usually called the sheath, or
jacket).
Coaxial cable is less susceptible to interference and attenuation than twisted-pair cabling but
more susceptible then fiber-optic cable, this is due in part to the beneficial influence of coax
cable’s shielding, which absorbs environmental interference and diminishes its impact on
23
CSC 323 – Computer Networks
Twisted-Pair Cable
The most basic form of twisted-pair (TP) wiring consists of one or more pairs of insulated
strands of copper wire twisted around one another. These twists are important because they
cause the magnetic fields that form around a conducting wire to wrap around one another and
improve TP’s resistance to interference, while also limiting the influence of signals travelling
on one wire over another (called crosstalk).
TP wiring, whether shielded or unshielded, comes in many forms. Many networks commonly
use one-, two-, four-, six-, and eight-pair wiring; some forms of TP wiring may bundle as
many as 50 or 100 pairs within a single cable.
Fiber-Optic Cable
Fiber-optic cable trades electrical pulses for their optical equivalent, which are pulses of light.
Because no electrical signals ever pass through the cable, fiber-optic media is as immune to
interference as any medium can get. This also makes fiber-optic cables highly secure. They
emit no external signals that might be detected, unlike electrical or broadcast media, thereby
elimination the possibility of electronic eavesdropping.
capacities.
In any fiber-optic cable, each light –conducting core can pass signals in only one direction (so
that one end is always the sender and the other always the receiver). This means that most
types of fiber-optic cable incorporate two strands, each contained within separate cladding;
but such cables may be enclosed within a single sheath.
Installation of fiber-optic networks is somewhat more difficult and time –consuming than
copper media installation, but this is changing as advances in connector technology make
field termination of fiber-optic cables almost as fast and easy as copper terminations.
Intangible media
Intangible media are the media usually used to transmit data wirelessly, since no tangible
medium is involved. Although, it is very common in the LAN technologies but it has also
continue to play an increasing role in all kinds of networks. Some of these media are:
Infrared method which uses infrared light beams to send signals between pairs of devices.
Single –Frequency Radio uses low-powered, two-way radio communications, much like
those used in taxi-cabs, police communications, and other private radio system.
Spread-Spectrum Radio addresses several weaknesses of single-frequency
communications, whether high or low power. Rather than using single-frequency, spread-
spectrum uses multiple frequencies simultaneously, thereby improving reliability and
reducing susceptibility to interference. Also, using multiple frequencies makes
eavesdropping more difficult because of how individual frequencies are used together for
spread-spectrum communications.
25
CSC 323 – Computer Networks
It is very cheap and reliable and common among PCs and minicomputers, its
disadvantage is the large number of extra bits needed for the data to be interpreted.
Network Architecture
A network’s architecture generally refers to its overall structure, including topology, physical
media, and channel access method. Here are the specifics of different network architecture
standards, including Ethernet, token ring, and FDDI.
26
CSC 323 – Computer Networks
The Ethernet has its roots in an early packet radio network, called Aloha, developed at the
University of Hawaii to support computer communication across the Hawaiian Islands. Like
the Aloha network, the fundamental problem faced by the Ethernet is how to mediate access
to a shared medium fairly and efficiently (in Aloha the medium was the atmosphere, while in
Ethernet the medium is a coax cable). That is, the core idea in both Aloha and the Ethernet is
an algorithm that controls when each node can transmit.
Hub Hub
Ethernet Hub
Each Ethernet frame is defined by the format given in the Figure below. The 64-bit preamble
allows the receiver to synchronize with the signal; it is a sequence of alternating 0s and 1s.
Both the source and destination hosts are identified with a 48-bit address. The packet type
field serves as the demultiplexing key; that is, it identifies to which of possibly many higher-
level protocols this frame should be delivered. Each frame contains up to 1500 bytes of data.
27
CSC 323 – Computer Networks
Minimally, a frame must contain at least 46 bytes of data, even if this means the host has to
pad the frame before transmitting it. The reason for this minimum frame size is that the frame
must be long enough to detect a collision.
As the name suggests, a token ring network consists of a set of nodes connected in a ring as
shown below. Data always flows in a particular direction around the ring, with each node
receiving frames from its upstream neighbour and then forwarding them to its downstream
neighbour. This ring-based topology is in contrast to the Ethernet’s bus topology.
Like the Ethernet, however, the ring is viewed as a single shared medium; it does not behave
as a collection of independent point-to-point links that just happen to be configured in a loop.
Thus, a token ring shares two key features with an Ethernet: First, it involves a distributed
algorithm that controls when each node is allowed to transmit, and second, all nodes see all
frames, with the node identified in the frame header as the destination saving a copy of the
frame as it flows past.
The word “token” in token ring comes from the way access to the shared ring is managed.
The idea is that a token, which is really just a special sequence of bits, circulates around the
ring; each node receives and then forwards the token. When a node that has a frame to
transmit sees the token, it takes the token off the ring (i.e., it does not forward the special bit
pattern) and instead inserts its frame into the ring. Each node along the way simply forwards
the frame, with the destination node saving a copy and forwarding the message onto the next
node on the ring. When the frame makes its way back around to the sender, this node strips
its frame off the ring (rather than continuing to forward it) and reinserts the token in this way,
some node downstream will have the opportunity to transmit a frame.
28
CSC 323 – Computer Networks
The 802.5 frame format, which is depicted in Figure below, uses differential Manchester
encoding in the start and end delimiters. After the start delimiter comes the access control
byte, which includes the frame priority and the reservation priority. The frame control byte is
a demux key that identifies the higher-layer protocol. Similar to the Ethernet, 802.5 addresses
are 48 bits long. The standard actually allows for smaller 16-bit addresses, but 48-bit
addresses are typically used. When 48 bit addresses are used, they are interpreted in exactly
the same way as on an Ethernet. The frame also includes a 32-bit CRC. This is followed by
the frame status byte, which includes the A and C bits for reliable delivery.
Unlike 802.5 networks, an FDDI network consists of a dual ring—two independent rings that
transmit data in opposite directions as illustrated in Figure (A) below. The second ring is not
used during normal operation but instead comes into play only if the primary ring fails, as
depicted in Figure (B) below. That is, the ring loops back on the secondary fiber to form a
complete ring, and as a consequence, an FDDI network is able to tolerate a single break in the
cable or the failure of one station.
A B
Dual-fiber ring: (a) normal operation; (b) failure of the primary ring.
As in 802.5, each network adaptor holds some number of bits between its input and output
interfaces. Unlike 802.5, however, the buffer can be of different sizes in different stations,
although never less than 9 bits and never more than 80 bits. It is also possible for a station to
start transmitting bits out of this buffer before it is full.
29
CSC 323 – Computer Networks
The FDDI frame format, depicted in Figure above, differs in very few ways from that of
802.5. The major significant differences are the presence of a bit in the header to distinguish
synchronous from asynchronous traffic, and the lack of the access control bits of 802.5.
802.11 was designed to run over three different physical media—two based on spread
spectrum radio and one based on diffused infrared. The radio-based versions currently run at
11 Mbps, but may soon run at 54 Mbps.
16 16 48 48 48 16 48 0 -18,496 32
Control Duration Addr 1 Addr 2 Addr 3 SqlCtrl Addr 4 Payload CRC
Wireless (IEEE 802.11) Frame Format
30
CSC 323 – Computer Networks
The peculiar thing about the 802.11 frame format is that it contains four, rather than two,
addresses. How these addresses are interpreted depends on the settings of the ToDS and
FromDS bits in the frame’s Control field
However, no more than four repeaters may be positioned between any pair of hosts, meaning
that an Ethernet has a total reach of only 2500m.
b. Bridge
Like repeaters, bridges also connect two network segments and can connect dissimilar
physical media. However, bridges can also do the following:
Limit the traffic on each segment
Eliminate bottlenecks
Connect different network architectures, such as Ethernet and token ring, forward
frame between them.
A frame is the unit of data with which bridges work. Frames contain physical address
information and are defined at layer 2 of the OSI model, which is where bridges operate.
A bridge functions primary to filter traffic between network segments. As a network segment
receives a frame, the bridge looks at the physical destination address of the frame before
forwarding the frame to other segments.
31
CSC 323 – Computer Networks
If the frame’s destination is on another network segment, the bridge retransmits the frame out
through the appropriate port. However, if the destination is on the same network segment that
receives the frame, the bridge assumes the frame has already reached its destination and
discards it. As a result, network traffic is greatly reduced.
c. Switches
A switch is a high-speed multiport bridge. A switch is an intelligent hub that maintains a
switching table and keeps track of which hardware addresses are located on which
network segments.
Almost all the features of bridges are present in switches; the major primary difference
between bridges and switches is in the implementation details. Whereas a bridge may
have only two or three ports permitting the connection of only two or three network
segments, a typical switch may have between four and hundreds of ports; this allows
switches to interconnect many network segments.
Another primary difference between bridges and switches is the speed at which they
perform their tasks. A bridge has a general –purpose CPU that runs a software program
that implements the bridging. A switch uses a specialized processor that is
preprogrammed to perform the switching function. Therefore, a bridge performs its
functions in software, while a switch performs its functions in hardware.
d. Router
Router operate at the Network layer (Layer 3) of the OSI model and the protocol data unit
routers work with is called a packet. Routers are advanced devices that connect separate
networks to form an internetwork.
32
CSC 323 – Computer Networks
A connecting device such as router acts as switch. When a packet arrives from one of
its ports, the packet is forwarded through another port to the next switch (or final
destination). This process called switching occurs at the connecting device:
It is clear that the passage of a message from a source to a destination involves many
decisions. When a message reaches a connecting device, a decision needs to be made
to select one of the output ports through which the packet needs to be sent out. In
other words, the connecting device acts as a switch that connects one port to another
port.
The telephone network is not totally a circuit-switched network today as we now have
VoIP using packet switching method.
2. Packet switching: The message divided into manageable packets at the source before
being transmitted. The packets are assembled at the destination. It can be Connectionless
service or Connection- oriented service
e. Gateways
A gateway is an intricate piece of networking equipment that translates information
between two dissimilar network architectures or data formats. Example of a gateway is a
system that converts Microsoft Mail to Simple Mail Transport Protocol (SMTP) for
transmission over the internet.
33
CSC 323 – Computer Networks
Although routers work at the Network layer of the OSI model and can route packets of
the same protocol (such as TCP/IP over networks with dissimilar architectures (such as
Ethernet and token ring), gateways can route packets over networks with different
protocols. Gateways can change the actual format of the data, whereas routers only
repackage the data into difference frames.
f. Modems
A modem is a tool used to connect computers over a telephone line or TV cable line,
effectively extending a network beyond a local area. Because a modem can use existing
telephone lines, it remains one of the most popular methods to connect remote users to a
network or the internet.
A modem converts a digital signal received from a computer into an analog signal that can be
sent along regular telephone lines.
This conversion is called modulation. A modem modulates the digital signal into an analog
signal. Then, at the other end of the line, another modem demodulates the analog signal back
to digital. Thus, the term Modulator/DEModulator, or modem is used. Modem speed is
measured in the number of bits per second (bps) that can be transmitted.
34
CSC 323 – Computer Networks
Protocol
A Protocol is a set of rules that governs data communications. A protocol defines
What is communicated,
How it is communicated,
When it’s communicated.
Protocols Elements
Syntax: refers to the structure or format of the data,
• Meaning the order in which they are presented.
Standards
Data communications standards fall into two categories:
De facto: meaning by fact or by convention
• Are those that have not been approved by an organized body but have
been adopted as standards through widespread use.
35
CSC 323 – Computer Networks
The ISO, usually in conjunction with a second standards organization known as the
International Telecommunications Union (ITU),1 publishes a series of protocol specifications
based on the OSI architecture.
This series is sometimes called the “X dot” series since the protocols are given names like
X.25, X.400, X.500, and so on. There have been several networks based on these standards,
including the public X.25 network and private networks like Tymnet.
Starting at the bottom and working up, the physical layer handles the transmission of raw bits
over a communications link. The data link layer then collects a stream of bits into a larger
aggregate called a frame. Network adaptors, along with device drivers running in the node’s
OS, typically implement the data link level. This means that frames, not raw bits, are actually
delivered to hosts. The network layer handles routing among nodes within a packet-switched
network. At this layer, the unit of data exchanged among nodes is typically called a packet
rather than a frame, although they are fundamentally the same thing. The lower three layers
are implemented on all network nodes, including switches within the network and hosts
connected along the exterior of the network. The transport layer then implements what we
have up to this point been calling a process-to-process channel. Here, the unit of data
exchanged is commonly called a message rather than a packet or a frame. The transport layer
and higher layers typically run only on the end hosts and not on the intermediate switches or
routers.
36
CSC 323 – Computer Networks
There is less agreement about the definition of the top three layers. Skipping ahead to the top
(seventh) layer, we find the application layer. Application layer protocols include things like
the File Transfer Protocol (FTP), which defines a protocol by which file transfer applications
can interoperate. Below that, the presentation layer is concerned with the format of data
exchanged between peers, for example, whether an integer is 16, 32, or 64 bits long and
whether the most significant bit is transmitted first or last, or how a video stream is formatted.
Finally, the session layer provides a name space that is used to tie together the potentially
different transport streams that are part of a single application. For example, it might manage
an audio stream and a video stream that are being combined in a teleconferencing application.
1. Network Interface
This layer combines the Physical and Data Link layers and routes the Data between devices
on the same network. It also manages the exchange of data between the network and other
devices.
37
CSC 323 – Computer Networks
2. Internet Layer
This layer corresponds to the Network layer in OSI model. The Internet Protocol (IP) uses
the IP address, consisting of a Network Identifier and a Host Identifier, to determine the
address of the device it is communicating with
3. Transport Layer
This layer corresponds to the OSI Transport layer. This is the part of the protocol stack
where the Transmission Control Protocol (TCP) can be found.
TCP works by asking another device on the network if it is willing to accept information
from the local device.
4. Application Layer
Layer 4 combines the Session, Presentation and Application layers of the OSI model.
Protocols for specific functions such as email (Simple Mail Transfer Protocol, SMTP) and
file transfer (File Transfer Protocol, FTP) reside at this level.
38
CSC 323 – Computer Networks
The checksum calculation used by TCP is a bit different than a regular checksum algorithm.
A conventional checksum is performed over all the bytes that the checksum is intended to
protect, and can detect most bit errors in any of those fields. The designers of TCP wanted
this bit error protection, but also desired to protect against other type of problems.
TCP Characteristics
1. Stream orientation: When two application programs transfer large volumes of data, the
data is viewed as a stream of bits, divided into 8-bit octets or bytes. So, TCP allows the
sending process to deliver data as a stream of bytes and allows the receiving process to
obtain data as a stream of bytes.
2. Virtual circuit connection: Before transfer can start, both the sending and receiving
application programs interact with their respective operating systems, informing them of
the desire for a stream transfer.
3. Buffered transfer: Application programs send a data stream across the virtual circuit by
repeatedly passing data octets to the protocol software.
4. Packetizing: TCP groups number of bytes together into packet called segment.
5. Full duplex connection: Connection provided concurrent transfer in both directions.
6. Reliable Service: It uses an acknowledgment mechanism to check the arrival of data.
Using Traditional Technique known as “Positive Acknowledgement with
Retransmission (PAR)”
39
CSC 323 – Computer Networks
40
CSC 323 – Computer Networks
Note: Congestion Control and Flow Control, what is the difference? Flow control involves
preventing senders from overrunning the capacity of receivers. Congestion control involves
preventing too much data from being injected into the network, thereby causing switches or
links to become overloaded. Thus, flow control is an end-to-end issue, while congestion
control is concerned with how hosts and networks interact.
2. Acknowledgment number
– The sequence number in each direction shows the number of the first byte carried
by the segment.
For example: If a party uses 5643 as an acknowledgment number, it has received all bytes
from the beginning up to 5642.
41
CSC 323 – Computer Networks
42
CSC 323 – Computer Networks
The protocol provides application programs with ability to send and receive messages by
allowing multiple, application programs on a single machine to communicate concurrently to
give a best-effort service to the networks. In that case;
Message can be delayed, lost, or duplicated
Messages can arrive out of order
Messages can arrive faster than the recipient can process them
Application accepts full responsibility for errors
43
CSC 323 – Computer Networks
A datagram is,
"a self-contained, independent entity of data carrying sufficient information to be routed from
the source to the destination computer without reliance on earlier exchanges between this
source and destination computer and the transporting network”
Although UDP does not implement flow control or reliable/ordered delivery, it does a little
more work than to simply demultiplex messages to some application process—it also ensures
the correctness of the message by the use of a checksum. (The UDP checksum was optional
in the IPv4 Internet, but it has become mandatory with IPv6.)
UDP Format
User Datagram consists of two parts:
UDP Header: Divided into four 16-bit fields
UDP Data area
44
CSC 323 – Computer Networks
Source and Destination ports: contains 16 bits each used to demultiplex datagrams among
the processes waiting to receive them.
Length: contains a count of octets in UDP datagram including the UDP header and the
user data.
Checksum: optional and need not to be used at all
If UDP CHECKSUM field contains zeroes, receiver does not verify the checksum
Checksum: A small integer value sent with a packet and used to detect errors that can
result when a packet is transmitted from one machine to another.
Layering UDP above IP means that a complete UDP message, including UDP header and
Data, is encapsulated in an IP datagram as it travels across an internet.
45
CSC 323 – Computer Networks
ICANN (Internet Corporation for Assigned Names and Numbers) is responsible for
managing the assignment of network layer (i.e. IP addresses) and application layer addresses
(e.g. www.aaua.edu.ng).
This is same as telephone system each telephone subscriber has a unique telephone number if
we consider the country code and the area code as part of the identifying scheme. For
example, the telephone number 011 86 731 220 8098 uniquely identifies a number in the city
of Changsha in Hunan Province in China.
ICANN sets the rules by which new domain names (e.g. .com, .org. .ca, .uk, .ng) are created
and IP address numbers assigned to users. It’s therefore directly manages a set of Internet
domains (e.g. .com, .org) and authorizes private companies to become domain name
registrars for those domains. Once authorized, a register can approve requests for application
layer addresses and assign IP numbers for those requests.
Important Note:
Example 1
Change the following IPv4 addresses from binary notation to dotted-decimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 11100111 11011011 10001011 01101111
d. 11111001 10011011 11111011 00001111
Solution
We replace each group of 8 bits with its equivalent decimal number and add dots for
separation:
46
CSC 323 – Computer Networks
a. 129.11.11.239
b. 193.131.27.255
c. 231.219.139.111
d. 249.155.251.15
Example 2
Change the following IPv4 addresses from dotted-decimal notation to binary notation.
a. 111.56.45.78
b. 221.34.7.82
c. 241.8.56.12
d. 75.45.34.78
Solution
We replace each decimal number with its binary equivalent:
a. 01101111 00111000 00101101 01001110
b. 11011101 00100010 00000111 01010010
c. 11110001 00001000 00111000 00001100
d. 01001011 00101101 00100010 01001110
Example 3
Find the error, if any, in the following IPv4 addresses:
a. 111.56.045.78
b. 221.34.7.8.20
c. 75.45.301.14
d. 11100010.23.14.67
Solution
a. There should be no leading zeroes (045).
b. We may not have more than 4 bytes in an IPv4 address.
c. Each byte should be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal notation.
Classful Addressing
The IP addresses started a few decades ago with the concept of classes. This architecture is
called Classful Addressing.
In the mid-1990s, a new architecture, called classless addressing, was introduced that
supersedes the original architecture.
47
CSC 323 – Computer Networks
Class A
Class B
Class C
Class D
Class E
Example 1
Find the class of each address:
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 10100111 11011011 10001011 01101111
d. 11110011 10011011 11111011 00001111
Solution
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C address.
c. The first bit is 1; the second bit is 0. This is a class B address.
d. The first 4 bits are 1s. This is a class E address.
Example 2
Find the class of each address:
a. 227.12.14.87
b. 193.14.56.22
c. 14.23.120.8
d. 252.5.15.111
Solution
a. The first byte is 227 (between 224 and 239); the class is D.
b. The first byte is 193 (between 192 and 223); the class is C.
48
CSC 323 – Computer Networks
Example:
Two level addressing can be found in other communication:
A fixed line telephone system inside Nigeria can be thought as two parts:
Area code netid
Area code: defines the area
49
CSC 323 – Computer Networks
Example 1
An address in a block is given as 73.22.17.25. Find the number of addresses in the block,
the first address, and the last address.
Solution
Since 73 is between 0 to 127, the class of the address is A. The value of n for class A is 8.
This is a possible configuration of the network that uses this block.
1. The number of addresses in this block is N = 232-n = 16,777,216.
2. To find the first address, we keep the leftmost 8 bits and set the rightmost 24 bits all to
0s. The first address is 73.0.0.0/8, in which 8 is the value of n.
3. To find the last address, we keep the leftmost 8 bits and set the rightmost 24 bits all to 1s.
The last address is 73.255.255.255.
Example 2
An address in a block is given as 180.8.17.9. Find the number of addresses in the block,
the first address, and the last address.
Solution
Since 180 is between 128 and 191 the class of the address is B. The value of n for class B is
16. It is a possible configuration of the network that uses this block.
1. The number of addresses in this block is N = 232−n = 65,536.
2. To find the first address, we keep the leftmost 16 bits and set the rightmost 16 bits all to
0s. The first address is 18.8.0.0/16, in which 16 is the value of n.
3. To find the last address, we keep the leftmost 16 bits and set the rightmost 16 bits all to
1s. The last address is 18.8.255.255.
Fragmentation
Some networks have media restriction and must enforce a maximum transmission unit
(MTU).
MTU is determined by OSI data link layer.
The network layer then builds the packets according to specification.
Should the packet come across a network that requires smaller packets, the router
connected to the network will fragment the packets before forwarding them on the
network medium.
This process called fragmentation.
50
CSC 323 – Computer Networks
IP datagram
Example:
In this analogy,
51
CSC 323 – Computer Networks
It’s a dangerous world out there in the World Wide Web. Just as your mother may have told
you to never talk to strangers, the same advice holds true for the virtual world. You may
know to be wary of giving strangers your business bank account details. But can you be sure
the website you’re logging into is that of your bank and not a forgery created by
cybercriminal? Cybercriminals use many different methods to lure you into parting with your
confidential personal or business information.
With the introduction of the computer, the need for automated tools for the protection of files,
and other information stored on the computer has become evident. This is especially true for a
shared system, such as a time sharing system, and the need is even more acute for systems that
can be accessed over a public telephone network, data network or the internet. The generic
name for the collection of tools designed to protect data and thwart hackers is computer
security.
In the lecture, we will be more interested in network security. This deals with the security of
information during its transmission from user on one computer network to another. Of
course, computer security is important too, since if someone can access your computer’s
resources, he/she will have access to the network, and other computers attached to this network.
Thus, computer and network security measures go hand in hand. However, we will limit our
discussion in this lecture to network security.
Network security problems can be divided roughly into four intertwined areas: confidentiality,
authentication, nonrepudiation and integrity control.
1. Confidentiality: This is also called secrecy, and has to do with keeping information
out of the hands of unauthorized users. This is what usually comes to mind when people
think about network security.
2. Authentication: This deals with determining whom you are talking to before
revealing sensitive information or entering into a business deal.
3. Nonrepudiation: This deal with signatures: How does jumia.com.ng prove that Douglas
i n d e e d placed an order for a book, which Douglas c l a i m s he never placed?
4. Integrity: How does one ensure that the message received was really the one sent, and
not something that a malicious adversary modified in transit or concocted?.
The attacks that compromise network security also be classified as passive attacks and active
attacks.
1. Passive Attacks: These attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. The goal of the opponent is to obtain information that is being transmitted.
Two types of passive attacks are release of message contents where an eavesdropper tries to learn
the contents of what is being transmitted. This can be prevented by encryption (Not part of this
lecture). A second type of passive attack is called traffic analysis, where the opponent tries to
observe the pattern, frequency and length of messages being exchanged which could be used in
guessing the nature of the communication that is taking place. Passive attacks are very difficult
to detect since they do not involve the alteration of the data. The emphasis, therefore, is on
prevention via a good encryption algorithm.
52
CSC 323 – Computer Networks
2. Active A t t a c k s : Active attacks involve some modification of the data stream or the
creation of a false stream. These attacks present the opposite characteristics of passive
attacks. It is difficult to prevent active attacks absolutely because to do so would require
physical protection of all communications facilities and paths at all times. Instead, the goal is
to detect them and to recover from any disruption or delays caused by them.
ii. Trojan horse: Users can infect their computers with Trojan horse software simply by
downloading an application they thought was legitimate but was in fact malicious. Once
inside your computer, a Trojan horse can do anything from record your passwords by
logging keystrokes (known as a keystroke logger) to hijacking your webcam to watch and
record your every move.
iii. Malicious spyware: Malicious spyware is used to describe the Trojan application that
was created by cybercriminals to spy on their victims. An example would be keylogger
software that records a victim’s every keystroke on his or her keyboard. The recorded
information is periodically sent back to the originating cybercriminal over the Internet.
Keylogging software is widely available and is marketed to parents or businesses that
want to monitor their kids’ or employees’ Internet usage.
iv. Computer worm: A computer worm is a software program that can copy itself from one
computer to another, without human interaction. Worms can replicate in great volume and
with great speed. For example, a worm can send copies of itself to every contact in your
email address book and then send itself to all the contacts in your contacts’ address books.
Because of their speed of infection, worms often gain notoriety overnight infecting
computers across the globe as quickly as victims around the world switch them on and
open their email. This happened with the Conficker worm (also known as Downadup),
which, in just four days, had more than tripled the number of computers it infected to 8.9
million.
2. Botnet
A botnet is a group of computers connected to the Internet that have been compromised by a
hacker using a computer virus or Trojan horse. An individual computer in the group is known
as a “zombie“ computer. The botnet is under the command of a “bot herder” or a “bot
master,” usually to perform nefarious activities. This could include distributing spam to the
email contact addresses on each zombie computer, for example. If the botnet is sufficiently
big in number, it could be used to access a targeted website simultaneously in what’s known
as a denial-of-service (DoS) attack. The goal of a DoS attack is to bring down a web server
53
CSC 323 – Computer Networks
by overloading it with access requests. Popular websites such as Google and Twitter have
been victims of DoS attacks.
3. Eavesdropping
Eavesdropping is the most obvious form of unauthorised access, involving “snooping” on
information carried by the network. The term originates from the idea that an “eavesdropper”
could overhear what people inside a house were saying by standing under the eaves of the
house and listening at an open window.
Eavesdropping is a significant problem for networks that make use of radio transmission, or
where the network cabling itself can radiate enough of an electrical signal to allow messages
to be intercepted.
4. Rootkit
A rootkit is a collection of tools that are used to obtain administrator-level access to a
computer or a network of computers. A rootkit could be installed on your computer by a
cybercriminal exploiting a vulnerability or security hole in a legitimate application on your
PC and may contain spyware that monitors and records keystrokes.
5. Social engineering
A social engineering attacks are not relying on technology or protocols to succeed, but
instead it relies on the human nature. Users generally trust each other and that is where this
type of attacks start. It may comprise of false sites that ask for the information from the
unsuspecting web surfers. And this type of attack is known as phishing. A social engineering
attacks might be prevented by just training the users not to provide their credentials who asks
for the information on the web page.
The distributed denial of service is the attack occurs when the multiple system is used to
flood the resources or bandwidth of a group of servers or one server. The main purpose of
54
CSC 323 – Computer Networks
this attack is to saturate a resource so that it is not available longer for the legitimate use. It is
used as the decoy to hide more malicious attack which attempts to steal sensitive information
or other data. The specialized software called DDS can able to block the traffic that has a
legitimate content but the bad intent.
8. Packet sniffing
The attacker can use the protocol analyzer to launch the attack by the packet sniffing. This is
the process in which an attacker gathers the data sample with a software or hardware device
which allows data inspection at a packet level. The attacker may see the IP addresses,
unencrypted passwords, sensitive data and MAC addresses. After a vulnerability is
discovered, the attacker will begin an active attack. The perfect method to prevent this attack
is to forbid anything except the trusted network administrators from placing the packet
analyzer on a network. Most of the packet analyzers can identify the presence of the packet
analyzer, unless an attacker uses software to make the attack invisible.
9. Physical Attacks
Along with the many ways that a network can be attacked by electronics means, there are
many ways that it can be attacked physically; this can be as a result of malicious activity, or a
consequence of natural events, or by accident. In general, physical attacks tend to result in
denial of service. These kinds of attacks include:
i. Fire (either accidentally or deliberately)
ii. Flood
iii. Earthquake damage
iv. Theft of equipment
v. Damage to buried cables, for example caused by workmen digging up roads (also
known as “Black Hole Event”)
attack is educating how to handle them. It is important to know the procedures, protocols and
policies for the security of a network. Or else training users give a real advantage of the
relatively low cost.
2. Patch management
When an application or an operating system is released, it is not perfect from the security
perspective. Then after the release, updates and security patches are released on the ongoing
basis, which can add to software to make them more secure or provide it more functionality.
The windows update systems which are installed in the latest servers and clients can be
configured to install as well as download the patches automatically from the site. The
windows server updates services to download the patches to servers and then test it before
applying to the bulk of the clients on the network.
It is essential to understand the security threats which affect the networks. And be familiar
with the affecting networks like DoS attacks, worms, viruses, smurf, social engineering and
man in the middle attacks. It is necessary to learn each type of these attacks operates and how
56
CSC 323 – Computer Networks
to secure it. Additionally, understand the mitigation techniques such as incident response,
procedure and policies, patch management and training and awareness. Understand efficient
and effective method of protecting against the social engineering threats and also other
network weaknesses. Understand the security patches must be used to update the applications
and operating systems
However, considering network security in isolation is not the whole story. Network security
should be considered as part of an overall analysis of the potential impact on the business or
organization if it suffers a major disaster, be it of natural, accidental or malicious origin. A
business that fails to look at the consequences of such disaster, and what steps it would take
to ensure that it can recover and continue in business may well find itself out of business in
the future.
The types of things that a business continuity plan might cover include:
i. Provision of off-site data centres
ii. Availability of alternative office space
iii. Provision of temporary switchboards and network connectivity.
Reading Texts:
1. Larry Peterson & Bruce Davie. Computer Networks: A System Approach. 3rd Edition.
Morgan Kaufmann Publishers.
2. Emad Aboelela. Network Simulation Experiment Manual. 4th Edition. University of
Massachusetts, Dartmouth (USA).
3. Michel Barbeau & Evangelos Kranakis. Principles Ad-Hoc Networking. Carleton
University, Canada.
4. NCC Education. Enterprising Networking. 2nd Edition. NCC Education Limited.
Machester M20 2EZ.
57