You are on page 1of 2

TOPOLOGY Data Link Layer IPv6 ADDRESS-The IPv6 consist of 16 bytes, it is 128 bits

The topology of a network is the geometric The data link layer is responsible for moving long. IPv6 specifies Hexa-decimal notation 128 bits
representation of the relationship of all the links and frames from one node to the next. o It makes the physical divided into 8 sections, each 2 bytes in length.
linking devices to one another. o Two or more devices layer appear error-free to the upper layer. Application Layer : The application layer in TCP/IP is
connected to a link; two or more links form a topology. o Framing: The data link layer divides the streams of bits equivalent to the combined session, presentation, and Categories of Addresses
In other words , topology refers to the way in which a received from the network layer into manageable data application layers in the OSI model. Unicast addresses.
network is laid out physically. units called frames. Physical addressing:- If frames are to Circuit Switched Networks o A circuit switched network is Multicast addresses
oThere are four basic topologies possible: be distributed to different systems on the netwo rk, the made of a set of switches connected by physical links, in Anycast addresses.
Mesh topology data link layer adds a header to the f rame to define the which each link is divided into n channels. o A connection Reserved Addresses
Star topology sender and/or receiver of the frame. between two stations is a dedicated path made of one or Local Addresses
Bus topology Flow control:-If the rate at which the data are absorbed more links. However, each connection uses only one Unicast Addresses-A unicast address defines a single
Ring topology by the receiver is less than the rate at which data dedicated channel on each link. computer. The packet sent to a unicast address must be
Mesh Topology produced in the sender, the data link layer imposes a flow Three Phases delivered to that specific computer.
Point to point connection o In a mesh topology, every control mechanism to avoid overwhelming the receiver. 1.Setup phases :Before the two parties can communicate, Multicast Addresses Multicast addresses are used to
device has a dedicated point-to-point link to every other Error control:It uses mechanisms to detect and retransm a dedicated circuit needs to be established. It includes define a group of hosts ins tead of just one. A packet sent
device. Easy to install and recon figure. Less cabling needs it damaged or lost frames. setup request and acknowledgement. multicast must be delivered to each member of the
to be housed Robustness Access control:Data link layer protocols are necessary to 2.Data transfer phase After the establishment of the group.
Star Topology determine which device has control over t he link at any dedicated circuit, the two parties can transfer data. Anycast Addresses-An anycast address, like a multicast
Point-to-point connection o In a star topology, each given time. 3.Tear down phase:-When one of the parti es needs to address, also defines a
device has a dedicated point-to-point link only to a Transport Layer:The transport layer is responsible for disconnect, a signal is sent to e ach switch to release the group of nodes.
central controller, usually called hub. o The devices are proce ss-to process delivery of the entire message oA resources. Reserved Addresses- These addresses start with 8 zeros.
not directly linked to another. o Star topology does not process is an application program running on a host. 2.a-DATAGRAM NETWORKS If the message is going to 1.Unspecified address2.Loopback address: 3.Compatible
allow direct traffic between devices. The controller acts Responsibilities of transport layer: pass through a packet switched network, it needs to be address. 4.Mapped address 5.Local Addresses:
as an exchange: Service-point addressing: The network layer gets each divided into packets of fixed or variable size In a datagram Classful Addressing-IPv4 addressing, at its inception,
Bus Topology packet to the correct computer; the transport layer gets network, each packet is tre ated independently of all used the concept of class es. This architecture is called
Multi point link o One long cable acts as a backbone to the entire message to the correct process In that others. Packets in this approach are referred to as classful addressing Classless Addressing- To overcome
link all the devices in a network. o Nodes are connect ed computer. datagrams. address depletion. In this scheme, there are no classes,
to the bus cable by drop lines and taps. Segmentation and reassembly: 2.b-Virtual Circuit Network A virtual-circuit network is a but the addresses are still granted in blocks.To simplify
Ring Topology A message is divided into transmittable se gments, with cross betwee In a circuit switched network and a datagra the handling of addresses, the Internet authorities
In a ring topology, each device has a dedicated point-to- each segment containing a sequence number. m network. It has some characteristics of both:As in a impose three restrictions on classless address blocks
point connection with only the two dev ices on either side Connection control: The transport layer can be either circuit switched network, all pa ckets follow the same Network Address Translation (NAT)
of it. o A signal is passed along the ring in one direction, connectionless or connection oriented. path established dur ing the connection. A virtual circuit The number of home users and small businesses that
from device to dev ice, until it reaches the destination. Flow control :End to end flow control network is normally implemented in the data link want to use the Internet is ever increasing. Address
o Each device in the ring incorporates a repeater. When a Error control : Process to process error control. ttvtlayer. Space-It has a much larger address space; 2128 addresses
device receives a signal intended for another device, its Session Layer : The session layer is responsible for dialog NETWORKING AND INTERNETWORKING DEVICES are available. A few left most bits, called the type prefix,
repeater regenerates the bit s and passes them along. control and synchronization. Networking and internetworking devices are divided into in each address define its category. The type prefix is
Hybrid Topology Dialog control:-It allows the communication between two four categories: variable in length, but it is designed such that no code is
Combination of two or more topologies is known as processes to take place in either half-duplex or full-duplex 1: Repeaters act only upon the electrical components of a identical to the first part of any other code.
hybrid topology. mode. Synchronization: The session layer allows a signal and are therefore active only at physical layer. Categories:
NETWORKS:- A network is a set of devices (often In process to add check points, or synchronization points, to 2:Bridges utilize addressing protocols and can effect flow Unicast addresses.
referred to nodes) connected by communication links. a stream of data. control of a single LAN; they are most active at the data Multicast addresses
CATEGORIES OF NETWORKS Presentation Layer The presentation layer is concerned link layer. Anycast addresses.Reserved Addresses Local Addresses
1.LAN [ Local Area Network] with the syntax and semantics of the information 3:Routers provide links between two separate but same Unicast Addresses-A unicast address defines a single com
LAN is a network which is designed to operate over a exchanged between two systems. type LANs and are most active at the network layer. puter. The packet sent to a unicast address must be
small physical area such as an office, factory or a group of Responsibilities: Translation: The presentation layer at 4:Gateways provide translation service bet ween delivere d to that specific computer.
buildings. the sender changes the information from its s ender- incompatible LANS or applications and are active in all of Multicast Addresses- Multicast addresses are used to
It is usually a privately owned network. dependent format into a common format the layers. define a group of hosts instead of just one. A packet sent
2.MAN [Metropolitan Area Network] Encryption:-To ensure privacy, the sender transforms the 1.REPEATERS multicast must be delivered to each member of the
It is a network with a size between a LAN and a WAN. It original information to another form. A repeater or regenerator is an electronic device that group.
normally covers the area inside a town or a city. It is Compression:-It reduces the number of bit s contained in operates on only the physical I ayer of the OSI model.A Anycast Addresses- An anycast address, like a multicast
designed for customers who need a high speed the information. repeater installed on a link receives the signal before it address, also defines a group of nodes.
connectivity, normally to the inter net, and have end Application Layer:The application layer is responsible for beco mes too weak or corrupted, regenerates the original INTERNET AS DATAGRAM NETWORK
points spread over a city or part of city. providing services to the user. bit pattern, and puts the refre Ished copy back onto the The internet has chosen the datagram approach to
3. WAN [Wide Area Network] Responsibilities: link. switching in the network layer. Delivery of a packet can
A WAN provides long-distance transmission of data, Network virtual terminal:-It is a software 2.BRIDGES be accomplished by using either a connection oriented or
image, audio, and video information over large version of a physical terminal, and it allows a user to log Bridges operate in both the physical and the data link a connectionless network service. Communication at the
geographic areas that may comprise a country, a on to a remote host. layers of the OSI reference model. Bridges can divide a network lay er in the Internet is connectionless. The
continent, or even the whole world. File transfer, access, and management Mail services large network into smaller segments.Bridges can also network layer protocol treats each packet independently,
4.PAN [Personal Area Network] Directory services. provide security through the partitioning of traffic. o A with each packet having no relationship to any other
It is a computer network organized around an in dividual TCP/IP PROTOCOL SUITE bridge operates at the data link layer giving it access to packet. The packet in a message may or may not travel
person. It generally consist of a mobile computer, a cell The original TCP/IP protocol suite was defined as having the physical addresses of all stations connected to it. the same path to their destination. This type of service is
phone or PDA. It enables the communication among four layers: host-to-network, internet, transport, and Types of Bridges used in the datagram approach to packet switching
these devices. application.TCP/IP is compared to OSI, we can say that 1.Simple bridge These are the most primitive and least Comparison between IPv4 and IPv6 headers
5.CAN [Campus Area Network] the host-to-network layer is equivalent to the expensive bridge. It links two segments and contains a The header length field is eliminated in IPv6 because the
It is made up of an interconnection of LAN with limited combination of the physical and data link layers. The table that lists addresses of all the stations include in ea length of the header is fixed in this version. The service
geographical area. Network equipments such as switches, internet layer is equivalent to the network layer, ch of them.Installation and maintenance of simple type field is eliminated in IPv6 and replaced by the
routers and the transmission media are almost entirely the application layer is roughly doing the j ob of the bridges are time-consuming and potentially more to payload length field.the identification flag and the offset
owned by the campus owner. session, presentation, and application layers. trouble than the cost savings are worth. fields are the fragmentation extension loader header.The
INTERNETWORK the transport layer in TCP/IP taking care of part of the 2.Multiport bridge- A multiport can be used connect TTL field is called hop Limit in IPv6.The product field is
When two or more networks are connected, they become duties of the session layer. more than two LANS. replaced by the next header field
an internetwork or internet. ARPANET (Advanced The physical and data link layers, TCP/IP do es not define 3.Transparent bridge- Transparent bridge builds its table Static mapping-It involves in the creation of a table that
Research Project Agency Network) was introduced by any specific protocol. of station addresses on its own as it perform its bridge ass ociates a logical address with a physical address. This
Department of Defence in US. Network Layer functions table is stored in each machine on the network.
NETWORK MODELS TCP/IP supports the Internetworking Proto col. IP, in turn, 3.ROUTERS dynamic mapping-In this each time a machine knows one
OSI MODEL uses four supporting protoc ols: ARP, RARP, ICMP, and These are more sophisticated devices than repeaters and of thetwo addresses (logical or physical), it can use a to
An ISO standard that covers all aspects of network IGMP. Internetworking Protocol (IP) (IP) is the tr bridges. They have access to network layer addresses and find the other one.
communications is the Open System Interconnection The Internetworking Protocol contain software that enables them to determine which ICMP-The Internet Control Message Protocol (ICMP) has
Model.ISO (International Standards Organizaion) is a The internetworking protocol (IP) is th transmission of several possible paths between those addresses is the be en designed to compensate for the two deficiencies of
multinational body dedicated to worldwide agreement on mechanism used by the TCP/IP protocols. It is an best for a particular transmission. Routers act like stations IP. The IP protocol has no error-reporting or error-
international standards.It consists of separate but related unreliable and connectio nless protocol IP assumes the on a network. They receive packets from one connected correcting mechanism.The IP protocol also lacks a
layers, each of which defines a part of the process of unreliability of the underlying layers and does its best to network and pass them to a second connected network. mechanism for host and management queries. ICMP
moving info rmation between all types of computer get a transmission through to its destina tion, but with no Routing Concepts Least cost routing:- It is based on messages are divided into two broad categories:
systems. guarantees.IP transports data in packets called datag efficiency: which of the available path ways is the Error-reporting and Query messages
Seven layers of the OSI model rams, each of which is transported separate ly. Datagrams cheapest or, in networking terminology.The route The error-reporting messages report problems that a
Application can travel along different rou tes and can arrive out of requiring the smallest number of relays or hops.Routing is router or a host (destination) may encounter when it
Presentation sequence or be duplicated. classified as nonadaptive or adaptive processes an P packeto The query messages, which occur
Session Reverse Address Resolution Protocol(RARP ) Non adaptive routing:- Once a pathway to a destination in pairs, help a host or a network manager get specific
Transport Address Resolution Protocol(ARP) has been selected, the router sends all packets for that IGMP- Some processes sometimes need to send the same
Network Internet Control Message Protocol (ICMP) destination along that one route. Adaptive routing: -In message to a large number of receivers simultaneously.
Data Link Internet Group Message Protocol(IGMP) which, a router may select a new route for each packet in This is called multicasting, which is a one-to-many
The passing of the data an d network information do wn Time Division Multiplexing(TDM) response to changes in condition and topology of the communication. The Internet Group Management
through the layers of the sending device and ba ckup networks. Protocol (IGMP) is one of the necessary, but not
through the layers of the receiving device is ma de Transport Layer 4.GATEWAYS sufficient, protocols that is involved in multicasting.
possible by an interface between each pair of adjacent UDP and TCP are transport level protocols responsible for It operates in all seven layers of the OSI model. It is a ROUTING: Routing refers to the way routing tables are
layers. delivery of a message from a process (running program) protocol converter.A router by itself transfers, accepts created to help in forwarding. A host or a router has a
Organization of the layers to another process. and relays packets only across networks using similar routing table with an entry for each destination, or a
The upper OSI layers are almost always im plemented in User Datagram Protocol protocols. A gateway, on the other ha nd, can accept a combination of destinations , to route IP packets. The
software; lower layers are a c ombination of hardware It is a process-to-process protocol that ad ds only port packet formatted for one protocol and convert it to a pac routing table can be either static or dynamic.
and software, exc ept for the physical layer, which is addresses, checksum error con trol, and length ket formatted for another protocol.A gateway is generally Static routing table contains information entered
mostly h ardware information to the data from the upper layer. software installed within a router. manually. The administrator enters the route for each
LAYERS IN THE OSI MODEL Transmission Control Protocol LOGICAL ADDRESSING destination into the table.
Physical Layer: The physical layer is responsible for move The Transmission Control Protocol (TCP) provides full The packet transmitted by the sending computer may A dynamic routing table is updated periodially by using
ments of individual bits from one node to the next. The transport-layer services to app lications. TCP divides a pass through several LANs or WANs before reaching the one of the dynamic routing protocols such as RIP, OSPF,
physical layer coordinates the functions required to carry stream of data into smaller units called segments. destination computer. For this level of communication, or BGP Routing Information Protocol (RIP) is an
a bit stream overall physical medium. o It deals with the Stream Control Transmission Protocol :It is a transport we need a global addressing scheme; we called this implementation of the distance vector protocol. Open
mechanical and electrical specifications of the interfaces layer protocol that combim es the best features of UDP logical addressing. Shortest Path First (OSP F) is an implementation of the
and transmission medium. The physical layer is concerned and TCP. IPv4 ADDRESSES- An IPv4 address is a 32-bit address that link state protocol. Border Gateway Protocol (BGP) is an
with the following: Advantages of IPv6-New options uniquely and universally defines the connection of a implementation of the path vector protocol.
Physical characteristics of interfaces and medíum - Allowance for extension device (for example, a computer or a router) to the DISTANCE VECTORROUTING-In distance vector routing,
Representation of bits Support for resource allocation. Internet. The IPv4 addresses are universal in the sense the least-cost route between any two nodes is the route
-Data rate. support for more security that the addressing system must be accepted by any host with minimum distance.
-Synchronization of bits that wants to be con nected to the Internet.
-Line Configuration
TCP: TCP provides a one-to-one, connection-oriented, Longitudinal redundancy check (LRC) or horizontal
reliable communications service.TCP is responsible for the redundancy check is a form of redundancy check that is
establishment of a TCP connection, the sequencing and applied independently to each of a parallel group of bit
acknowled gment of packets sent, and the recovery of streams.The data must bedivided into transmission
packets lost during transmission. blocks, to which the additional check data is
Message Authentication Code (MAC)
UDP: UDP provides a one-to-one or one-to-many, added.Longitudinal (orhorizontal) redunda ncy checking
MAC algorithm is a symmetric key cryptographic
connectic Inless, unreliable communications service. UDP (LRC) adds a parity bit for all bits in the message at the
technique to provide message authentication. For
is used when the amount ofdata to be transferred is same bit position.
establishing MAC process, the sender and receiver share
small(such as the data that would fit into a single packet), Cyclic Redundancy Check An error detection me chanism
a symmetric key K.
when the overhead of establishing aTCP connection is not in which a special number is appended to a block of data
Essentially, a MAC is an encrypted checksum generated
desired, or when the applications or upper layer in order to detect any changes intro duced during storage
on the underlying message that is sent along with a
protocolsprovide reliable delive ry.It is commonly used in (or transmission).CRC is more powerful than VRC and LRC
message to ensure message authentication.
Video and Audio Casting, The HyperText Transfer Protocol indetecting errors
The sender uses some publicly known MAC algorithm,
(HTTP) is used to transfer files that make up the Web Carrier sense multiple access with collision detec tion
inputs the message and the secret key K and produces a
pages of the World Wide Web. (CSMA/CD )is a media access control method used most
MAC value.
notably in early Ethernet technology for local area
Similar to hash, MAC function also compresses an
The File Transfer Protocol (FTP) is used for interactive file networking.Ituses a carrier sensing scheme in which a
arbitrary long input into a fixed length output. The major
transfer The Simple Mail Transfer Protocol (SMTP) is transmitting station detects collision s by sensing
difference between hash and MAC is that MAC uses
used for the transfer of mail messages and attachments. transmissions from other stations while transmitting a
secret key during the compression.
Telnet, is a terminal emulation protocol, and, is used for frame.
The sender forwards the message along with the MAC.
remote login to network hosts. Internet protocol (IP) suite includes many applicat ion-
Here, we assume that the message is sent in the clear, as
Simple Mail Transfer Protocol (SMTP) is used to transfer layer protocols that represent a wide variety of
we are concerned of providing message origin
ele ctronic mail from one user to another. This task is applications, including the following:File Transfer Protocol
authentication, not confidentiality. If confidentiality is
done by means of email client software (User Agents) the (FTP)-Moves filesbetween devices.Simpl e Network-
required then the message needs encryption.
user is using.User Agents help the user to type and format Management Protocol (SNMP) Prima rily reports
On receipt of the message and the MAC, the receiver
the email and store it until internet is available. anomalous network conditions and set s network
feeds the received message and the shared secret key K
threshold values.Telnet-Serves as ater minal emulation
into the MAC algorithm and re-computes the MAC value.
File Transfer Protocol (FTP) is the most widely used protocol.
The receiver now checks equality of freshly computed
protocol for file transfer over the network. FTP uses Domain Name System (DNS) works on Client Serve
MAC with the MAC received from the sender. If they
TCP/IP for comm unication and it works on TCP port rmodel.It uses UDP protocol for transport layer co
match, then the receiver accepts the message and
21.FTP works on Client/ Server Model where a client mmunicationDNS uses hierarchical domain based naming
assures himself that the message has been sent by the
requests file from Server and server sends scheme.DNS server is configured with Fully Qualified
intended sender.
requestedresource back to the client. Post Office Protocol Message Digest
If the computed MAC does not match the MAC sent by
(POP) is a simple mail retrieval protocol used by User Message Digest is used to ensure the integrity of a
the sender, the receiver cannot determine whether it is
Agents to retrieve mails from mail server.When a dient message transmitted over an insecure channel (where
the message that has been altered or it is the origin that
needs to retrieve mails from server, it opens a connection the content of the message can be changed). The
has been falsified. As a bottom-line, a receiver safely
with the server on TCP port 110.User can then access his message is passed through a Cryptographic hash function.
assumes that the message is not the genuine.
mailsand download them to the local computer. Hyper This function creates a compressed image of the message
Text Transfer Protocol (HTTP) is the foundation ofWorld called Digest.
RSA :
Wide Web. Hypertext is well organized documentation Lets assume, Alice sent a message and digest pair to Bob.
It is the most popular asymmetric cryptographic
system which uses hyperlinks to link the pages in the To check the integrity of the message Bob runs the
algorithm. It is primarily used for encrypting messages but
textdocuments Stream Control Transmission Protocol cryptographic hash function on the received message and
can also be used for performing digital signature over a
(SCTP) is a transport layer protocol,serving in a similar gets a new digest. Now, Bob will compare the new digest
message.
role to the popular protoc ols TCP and UDP. Simple and the digest sent by Alice. If, both are same then Bob is
Let us understand how RSA can be used for performing
Network Management Protocol (SNMP) is a popular sure that the original message is not changed
digital signatures step-by-step.
protocol for network managementit is used for collecting This message and digest pair is equivalent to a physical
Assume that there is a sender (A) and a receiver (B). A
information from, and configuring, netw ork document and fingerprint of a person on that document.
wants to send a message (M) to B along with the digital
devicesSNMP exposes management data in the form of Unlike the physical document and the fingerprint, the
signature (DS) calculated over the message.
variables on the managed systems organized in a manage message and the digest can be sent separately.
Step-1 :Sender A uses SHA-1 Message Digest Algorithm to
ment information basewhich describe the system status Most importantly, the digest should be unchanged during
calculate the message digest (MD1) over the original
and configuration the transmission.
message M.
Circuit Switching - When two nodes communicate with The cryptographic hash function is a one way function,
Step-2 :A now encrypts the message digest with its
each other over a dedicated communication path, it is that is, a function which is practically infeasible to invert.
private key. The output of this process is called Digital
called circuit switching.There is a need of pre-specified This cryptographic hash function takes a message of
Signature (DS) of A.
route from which data travels and no other data is variable length as input and creates a digest / hash /
Step-3 :Now sender A sends the digital signature (DS)
permittedJn circuit switching to tran sfer the data,circuit fingerprint of fixed length, which is used to verify the
along with the original message (M) to B.Step-4 :
must be established so that the data transfer can take integrity of the message.
When B receives the Original Message(M) and the Digital
place. Message digest ensures the integrity of the document. To
Signature(DS) from A, it first uses the same message-
Message Switching- This technique was somewh ere in provide authenticity of the message, digest is encrypted
digest algorithm as was used by A and calculates its own
middle of circuit switching and packet switch ing. In with sender’s private key. Now this digest is called digital
Message Digest (MD2) for M.
message switching, the whole message is tr eated as a signature, which can be only decrypted by the receiver
Step-5 :Now B uses A’s public key to decrypt the digital
data unit and is switching / transferred in its entirety.A who has sender’s public key. Now the receiver can
signature because it was encrypted by A’s private key.
switch working on message switching authenticate the sender and also verify the integrity of
The result of this process is the original Message Digest
In message switching, the whole message is tr eated as a the sent message.
(MD1) which was calculated by A
data unit and is switching / transferred in its entirety. A Hash functions
Step-6 :If MD1==MD2, the following facts are established
switch working on message switchin g,first receives the Hash functions are extremely useful and appear in almost
as follows.
whole message and buffers it u ntil there are resources all information security applications.
-B accepts the original message M as the correct,
available to transfer it tothe next hop.lf the next hop is A hash function is a mathematical function that converts
unaltered message from A.
not having enough reso urce to accommodate farge a numerical input value into another compressed
-It also ensures that the message came from A and not
sizemessage, the mess age is stored and switch waits. numerical value. The input to the hash function is of
someone posing as A.
This technique was considered substituteto circuit arbitrary length but output is always of fixed length.
RSA (Rivest–Shamir–Adleman) is an algorithm used by
switching. Values returned by a hash function are called message
modern computers to encrypt and decrypt messages. It is
Packet Switching - Shortcomings of message swit ching digest or simply hash values.
an asymmetric cryptographic algorithm.
gave birth to an idea of packet switching.The entire Encryption: Encryption means that the sender converts
Data encryption standard (DES) has been found
message is broken down intosmaller chunks called the original information into another form and sends the
vulnerable against very powerful attacks and therefore,
packets.The switching information is added in the header unintelligible message over the
the popularity of DES has been found slightly on decline.
of eachpacket and transmitted indep endently. It is easier
network.Decryption: Decryption reverses the Encryption DES is a block cipher, and encrypts data in blocks of size
for intermediate networking devices tostore small size
process in order to transform the message back to the of 64 bit each, means 64 bits of plain text goes as the
packets and they do not take much resources either on
input to DES, which produces 64 bits of cipher text.
carrier path or in the internal memory of switches.Packet original form.
Keys : it’s a variable value used for cryptographic algoriths The same algorithm and key are used for encryption and
switching enh ances line efficiency as packets from
decryption, with minor differences. The key length is 56
multiple appli cations can be multiplexed over the carrier. to produce encrypted text.The length of the key reflects
bits.
The in Iternet uses packet switching technique the difficulty to decrypt from the encrypted message CBC : XOR chaining, or cipher-block chaining, is a method
DCE -is the equipment used to transmit or receive the Digital Signature : in which the next block of plaintext to be encrypted is
data.DTE stands for Data Terminal Equipment, while DCE As the name sounds are the new alternative to sign a
XOR'd with the previous block of ciphertext before being
stands for DataCommunications Equipment. document digitally. It ensures that the message is sent by encrypted.
Error Detection and Correction-Data can be corr upted the intended user without any tampering by any third Electronic Code Book(ECB): Electronic code book is the
during transmission.Some applications requ ire that party (attacker). In simple words, digital signatures are
errors be detected and corrected.Some app lications can easiest block cipher mode of functioning. It is easier
used to verify the authenticity of the message sent because of direct encryption of each block of input
tolerate a small level of error.For exam ple,random electronically.
errorsin audio or video transmissions may betolerable, plaintext and output is in form of blocks of encrypted
Stream Cypher :A stream cipher processes the input
but when we transfer text, we expect a very high level of ciphertext.
elements continuously, producing output element one at
accuracy. single-bit a time, as it goes along
Types of errors Symmetric-Key Cryptography
single-bit-it means that only 1 bit of a given data unit
• Stream Cipher
(such as a byte,character, or packet) is changed from 1 to
0 or from 0 to 1.In a single-bit error,only 1 bit in the data • Block Cipher
unit has changed.Single-bit errors bare the least likely Two types of symmetric key cyphers -Traditional
type of error in serial data transmission. Symmetric Key Cipher & Modern Ciphers
burst error means that 2 or more bits in the data unit Traditional Symmetric Key Ciphers:
have changed from 1 to 0 or from 0 to 1. A bu rst error Types
means that 2 or more bits in the data unit have changed. =Substitution cipher
Redundancy :The central concept in detecting or
=Transposition cipher
correcting errors is redundancy.To be able to detect or
correct errors, we need to send some extra bits with our Caesar Cipher Replaces each letter by third letter on
data. These redundantbits are added by the sender and Monoalphabetic Cipher rather than just shifting the
removed by the receiver.Their pres ence allows the alphabet .Replaced by any other alphabet expect the
receiver to detect or correct corrupted bit. original alphabet.each plaintext letter maps to a different
Types random cipher text letter ,hence key is 26 letters long
Vertical redundancy check (VRC) is an error-check ng
method used on an eight-bit ASCII character. In VRC, a
Homoalphabetic cypher: Same as monoalphabetic but
parity bit is attached to each byte of data, which is then
tested to determine whether the transmission is correct. replaces with fixed letters

You might also like