COMMUNICATION CONTROL

Slides:



Advertisements
Similar presentations
Exercises and Solutions Lecture 1
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
I.S 512 TOPIC 1 – LESSON 2. Types Of Transmission Media PHYSICAL Twisted Pair Cable Shielded twisted-pair (STP ) Unshielded twisted-pair (UTP) Coaxial.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Computer Networking (Appendix C) Objectives
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Chapter 1 Introduction to Computer Networks and Data Communications.
IS Network and Telecommunications Risks
N ETWORKS, TYPE, CONNECTIVITY, TOPOLOGY, OSI MODEL, NETWORKING MEDIA, TRANSMISSION, SOFTWARE SUPPORT, NETWORK HARDWARE - BRIDGE, HUB, ROUTERS, SWITCH,
Chapter 6 Telecommunications & Networks.
Lecture 4a: Communication and Networking CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
CS 582 / CMPE 481 Distributed Systems Communications.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Telecommunications Chapter 5 Chapter 5 Telecommunications
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1-1 Introduction to Computer Networks and Data Communications.
Protocols and the TCP/IP Suite
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Chapter 12 Communication Controls. IS Auditor Role Collect evidence to ascertain an entities ability to: –Safeguard assets –Provide data integrity –Efficiency.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Network Architecture for Cyberspace
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
COMPUTER NETWORKS.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Lecturer: Tamanna Haque Nipa
Management Information Systems Lection 04 Networks CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
Networks and Telecommunications Strategies Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Technology Guide 4 Telecommunication & Internet. Agenda Telecommunication terminology Communication media Network architecture concepts Enterprise networking.
Lesson 9 Networking Core Hardware Fundamentals Objectives Explain network communications concepts, including full- and half-duplex, network cabling,
NETWORK.
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
Local Area Networks Chapter 17, Exploring the Digital Domain.
Local Area Network By Bhupendra Ratha, Lecturer
Unit 1—Computer Basics Lesson 7 Networks.
Communication and Network
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
By. Shafiq Ahmed Chachar Internet Applications Internet Relay Chat Telnet Search Engines E-Commerce File Transfer Protocol (FTP) Popular Uses of.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Internet Model. Interfaces Between Layers The passing of the data and network information down through the layers of the sending device and back up.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
7/12: Ch. 6 Telecommunications Business Value of Telecommunications Trends –Industry –Technology –Application Internet applications Network models –WANs,
Prepared By Kapil Soni IICE Udaipur (Learning Centre Code: ) 1 Networking.
The OSI Model.
Network Applications and Layered Architectures Protocols OSI Reference Model.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Chapter 5 Network Computing. Agenda Functions Feasibility Analysis.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
Chapter 4 Telecommunications and Networking The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
BY SANTHOSH G. What is Networking Network Requirements What is Topology Types of Topologies.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
9-1 Chapter 9 - Networking and Communication Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring Computer.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Data Communication Network Models
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Computer Engineering and Networks, College of Engineering, Majmaah University INTRODUCTION TO COMPUTER NETWORKS Mohammed Saleem Bhat
UNIT 4 NETWORK ENVIRONMENTS.
Intro to MIS – MGS351 Network Basics
Network Basics Extended Learning Module E
Network Topologies & Standards
Network Architecture for Cyberspace
NETWORK.
Presentation transcript:

COMMUNICATION CONTROL CHAPTER 12 COMMUNICATION CONTROL

COMMUNICATION SUBSYSTEM EXPOSURE Transmission impairments Component Failure Subversive Threats

Subversive threats to the Communication Subsystem Release of message contents Passive Attacks Traffic analysis Message insertion Message deletion Message modification Changed message order Message duplication Denial of message services Spurious associations Subversive Threats Active attacks

PHYSICAL COMPONENT CONTROLS Tramsmision Media Twisted paier Coaxial cable Optical fiber Bounded Transimission media Terrestrial microware Satellite microwave Radio frequency Infrared Unbounded

Communication Lines Modems Port-Protection Devices Multiplexors and Concentrators

LINE ERROR CONTROLS Error Detection Sends message Receiver Sender Returns copy of message

Error Correction Forward error correcting codes Retransmission of data in error(backward error correction)

FLOW CONTROLS The simplest form of flow control is stop-and-wait flow control The stop-and-wait flow control protocol is inefficient because the communication channel remains unused for periods of time while the receiver isprocessing the frames received.

TOPOLOGICAL CONTROLS Local Area Network Topologies Bus Topology Tree Topology Ring Topology Star topology Hybrid Topologies Wide Area Network Topologies

CHANNEL ACCESS CONTROLS Polling Methods Contention Methods

CONTROLS OVER SUBVERSIVE THREATS Link Encryption End-to-End- Encryption Stream Ciphers Error Propagation Codes Message authentication Codes Message Sequence Numbers Request-Response Mechanisms

INTERNETWORKING CONTROLS Three types of devices are used to connect subnetworks in an internet : Bridge Router Gateway

COMMUNICATION ARCHITECTURES AND CONTROLS The architecture has seven layers of function.each of which has as sociated controls : Physical - Session Data link - Presentration Network - App;ication Transport

AUDIT TRAIL CONTROLS Accounting Audit Trail Operations Audit Trail

EXISTENCE CONTROLS Some additional backup and recovery controls follow : Where possible, place redundant components and spare parts throughout the network. Use equipment with in-built fault diagnosis capabilities. Acquire high-quality test equipment. Ensure adequate maintenance of hardware and software, especially at remote site Ensure that adequate logging facilities exist for recovery purposes, especially where store-and-forward operations must be carried out in the network.