Professional Documents
Culture Documents
Ethernet has become the most widely used network technology for wired LANs due
to its simplicity, ease of maintenance, ability to incorporate new technologies and
reliability. It has a low cost of installation and is easy to upgrade. It is a frame-based
communication technology that is based on IEEE 802.3. Its baseband is defined in a
number of standards such as 10BASE5, 10BASE2, 10BASE-T, 1BASE5, 100BASE-
T, and so on. The first number, that is, 1, 10 and 100, indicates the data rate in Mbps.
The last number or letter indicates the maximum length of the cable and type of the
cable.
Repeater-A Repeater has two ports. Once it receives a signal, this is amplified to
eliminate any distortion (which has been introduced when it was travelling through
the communication channel) and forwarded to the output port.
Hub- A Hub is a multiport repeater which links multiple Ethernet devices. A Hub
passes the incoming signal to all the devices connected to it.
Bridge- A Bridge has two ports and operates in the data link layer. It transmits the
incoming frame only if the channel to its destination is free or the frame is a broadcast
frame. Each port on a bridge supports a full duplex operation.
Switch- A Switch is a multiport bridge. Unlike a hub, a Switch will not broadcast
frames across the entire network (unless it is a broadcast frame), it only sends the
frame to the intended ports.
Router- A Router is used as a gateway between a LAN and a WAN. A Router makes
intelligent decisions on how to route traffic. Routing protocols are composed of
different algorithms that direct the way routers move traffic. A Router operates in the
network layer.
Wireless LANs
1. Station: This describes any device that communicates over a WLAN, for example,
a notebook computer, or mobile phones that support WiFi. In ad-hoc networks these
devices can communicate between themselves by creating a mesh network Such a
collection of stations forming an ad-hoc network is called an Independent Basic
Service Set (Independent BSS or IBSS).
Bluetooth
Bluetooth defines two network architectures called Piconet and Scatternet. Piconet is
a Bluetooth network consisting of a master device and up to seven slave devices. A
device in a parked state can move to an active state if the number of slaves in the
Piconet falls below seven. Piconets can be interconnected through a Bridge which
could be a slave for one Piconet and master for another Piconet or slave for two
Piconets that are interconnected. Two types of Bluetooth links can be created for data
transfer. They are Synchronous Connection Orientated (SCO) link and Asynchronous
Connectionless Link (ACL). SCO is used when timely delivery is more important
than error-free delivery. On the other hand, ACL is used when error-free delivery is
more important than timely delivery.
Mobile communications
Mobile communication systems were designed initially to carry voice only. The
standard that has enabled this technology is GSM (Global System for Mobile
Communications). As an addon data service to GSM technology, the General Packet
Radio Service (GPRS) was developed.
GPRS uses the existing GSM network and adds two new packet-switching network
elements: the GGSN (Gateway GPRS Support Node) and the SGSN (Serving GPRS
Support Node). LTE is a competing technology to Wi Max and supports user mobility
up to 350 km/h, coverage up to 100 km, channel bandwidth up to 100 MHz with
spectral efficiency of the Downlink 30 bps/Hz and the Uplink 15 bps/Hz. LTE has
the advantage that it can support seamless connection to existing networks, such as
GSM and UMTS.
smart metering
Smart meters may be used in various ways and these lead to different requirements
for the metering communication system. Automated meter reading (AMR) requires
only occasional transmission of recorded energy data (perhaps once a month) while
advanced metering infrastructure (AMI) requires frequent bi-directional
communication (perhaps every 30 minutes). The use of smart meters to support Smart
Grid operation of the distribution network has not yet been implemented widely but
is likely to place severe demands on the communication system.
Modbus
The operation of a Smart Grid relies heavily on two-way communication for the
exchange of information. Real-time information must flow all the way to and from
the large central generators, substations, customer loads and the distributed
generators. At present, power system communication systems are usually restricted
to central generation and transmission systems with some coverage of high voltage
distribution networks. The generation and transmission operators use private
communication networks, and the SCADA and ICT systems for the control of the
power network are kept separate even from business and commercial applications
Cryptography has been the most widely used technique to protect information from
adversaries. As shown in Figure 4.1, a message to be protected is transformed using
a Key that is only known to the Sender and Receiver. The process of transformation
is called encryption and the message to be encrypted is called Plain text. The
transformed or encrypted message is called Cipher text. At the Receiver, the
encrypted message is decrypted.
Symmetric key encryption
In classical encryption both sender and receiver share the same Key. This is called
symmetric key encryption.
Substitution cipher
Plain text A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher text W Y A C Q G I K M O E S U X Z B D F H J L N P R T V
The encryption of message or plain text HELLO THERE will produce KQSSZ
JKQFQ as Cipher text. Since a given character is replaced by another fixed character,
this system is called a mono-alphabetic substitution.
Public key algorithms involve a pair of Keys called the public Key and the private
Key. Each user announces its public Key but retains its private Key confidentially. If
user A wishes to send a message to user B, then A encrypts the message using B’s
public Key. Public Key algorithms are such that it is practically not possible to
determine the decryption Key even though the encryption Key is known as it uses
one key for encryption and another for decryption. RSA (this acronym stands for
Rivest, Shamir and Adleman who first publicly described it) is a widely used public
Key algorithm.
Authentication
INTRODUCTION TO ENGINEERING
ECB-101
SUBMITTED TO SUBMITTED BY