Telecommunication Networks
1. Introduction
Instructor:
Text Books:
Mani Subramanian
Email:
RQ
William Stallings
riqureshi@gmail.com , rqureshi@iqra.edu.pk
Standardized Protocol
Architectures
RQ
RQ
OSI Model
RQ
All
People
Seems
To
Need
Data
Processing
5
RQ
OSI
vs.
TCP/IP
RQ
RQ
Protocol Hierarchies
The entities
comprising the
corresponding
layers on
different
machines are
called peers.
RQ
Protocol Hierarchies
Layer 5
(Application)
RQ
10
Protocol Hierarchies
RQ
11
Internet Layers
RQ
12
Physical Layer
RQ
13
RQ
14
RQ
15
Network Layer
RQ
16
RQ
17
Transport Layer
RQ
Port Addressing
Connection Control
Flow Control
Error Control
18
RQ
19
Application Layer
RQ
20
Summary
RQ
21
Information security
RQ
Computer security
Network or Internet security
22
Computer security
RQ
23
Network security
RQ
24
RQ
security attack
security mechanism
security service
25
26
RQ
27
Security Services
RQ
RQ
Interruption
Interception
Modification
Fabrication
29
Security Attacks
RQ
30
Security Attacks
Interruption: This is an
attack on availability
Interception: This is an
attack on confidentiality
Modification: This is
an attack on integrity
Fabrication: This is an
attack on authenticity
RQ
31
RQ
32
RQ
33
Security Services
Confidentiality (privacy)
Authentication (who created or sent the data)
Integrity (has not been altered)
Non-repudiation (the order is final)
Access control (prevent misuse of resources)
Availability (permanence, non-erasure)
RQ
34
Methods of Defence
RQ
Encryption
Software Controls (access limitations
in a data base, in operating system
protect each user from other users)
Hardware Controls (smartcard)
Policies (frequent changes of
passwords)
Physical Controls
35
RQ
36
RQ
37
Summary
have considered:
RQ
38