100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Networking Methods and Protocols $5.92   Add to cart

Summary

Summary Networking Methods and Protocols

 12 views  0 purchase
  • Course
  • Institution

This document is an 80-page summary with lots of images and text. The document goes through the structure of the OSI model, where it stands still per layer with an explanation of that part.

Preview 4 out of 80  pages

  • January 3, 2022
  • 80
  • 2020/2021
  • Summary
avatar-seller
SAMEN VATTING NMP
Networking Methods and Protocols


This will contain the following Weeks

1. Introduction & OSI
2. Physical
3. Datalink
4. Network
5. Transport
6. Application
7. Security


Richard Reijerse
S1128082


0

,Content
1 Global overview .............................................................................................................................. 2
1.1 Applications............................................................................................................................. 2
1.2 Things: Smart Objects ............................................................................................................. 2
1.3 Everything can be connected .................................................................................................. 3
1.4 Resources in a Network (DEFINITIONS) .................................................................................. 4
1.5 Expectations of reliable networks........................................................................................... 8
1.6 TCP/IP Model: a layered model ............................................................................................ 11
2 Physical.......................................................................................................................................... 12
2.1 Baseband transmission ......................................................................................................... 12
2.2 Passband transmission: multiple access to a medium ......................................................... 16
2.2.1 Analog ........................................................................................................................... 16
2.2.2 Digital ............................................................................................................................ 17
2.3 Wired media.......................................................................................................................... 23
2.4 Wireless Media ..................................................................................................................... 26
3 Datalink ......................................................................................................................................... 31
3.1 LLC & Requirements for media access .................................................................................. 32
3.2 Data send protocols .............................................................................................................. 33
3.3 Frames................................................................................................................................... 36
4 Network ........................................................................................................................................ 42
4.1 Network Layer Protocols....................................................................................................... 42
4.2 The IPv4 header .................................................................................................................... 43
4.3 The Need for IPv6.................................................................................................................. 43
4.4 IPv4 vs IPv6 Packet ................................................................................................................ 44
4.5 Testing and error handling IP ................................................................................................ 48
5 Transport....................................................................................................................................... 60
6 7: Security ..................................................................................................................................... 73
6.1 Security Definitions ............................................................................................................... 73




1

,1 Global overview
Religious
All
People
Political
Seem Financial
To Application
Need
Data Presentation
Processing Session
Transport
Network
Data Link
Physical
Figure 1 OSI model


1.1 Applications
− Smart grid (Energy)
− Industrial automation
− Smart cities and Urban Networks
− Home automation
− Building automation
− Structural health monitoring
− Container tracking
− Health monitoring




Figure 2 Network can be a connection between a lot of things



1.2 Things: Smart Objects
• Connect the analog and digital world
– Interaction with physical world
– Communication to outside world
• Components
– Sensor/actuator
– Microcontroller
– Storage
– Network
– Power




2

, 1.3 Everything can be connected
• Embedded systems
– Computer embedded in something other
than a computer (real-time)
• Ubiquitous computing
– Computing moves into everyday objects,
e.g. wearables
• Mobile telephony
– Ubiquitous always-on service, available
everywhere. Figure 3 Connection of smart objects, old and new
• Wireless Sensor Networks
– Smart dust
• Mobile computing
– Carry-around computers
• Computer Networking
– Computer communication via the Internet
• Telemetry & machine-machine communication
– Autonomic communication between non-human operated machines

Challenges for designing IoT things and networks
• Node-level
– Physical size
– Power
– Cost
• Network-level
– Large scale: thousands of nodes
• Network size: routing
• Data size
– Environment (QoS)
• Lossy networks
– Addressing
– Ad hoc: auto management (1 on 1)
– External access
• Security
– Privacy
• Ubiquitous data collection
• Who owns your (sensor) data?
– Cyber attacks
• DDoS
– From things with computers to computer with/doing things
• The Internet is a giant robot
– Physical safety
• Stuxnet
– Patching/updates
– Unauthorized access
• Physical
• Remote




3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller richardreijerse. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $5.92. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$5.92
  • (0)
  Add to cart