Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [1] DATA SECURITY IN X.25 NETWORKS Advisor: Mr. Anisur Rahman.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Computer Networks TCP/IP Protocol Suite.
Exercises and Solutions Lecture 1
There are many types of WAN technologies that can be used to solve the problems of users who need network access from remote locations. We will go through.
X.25 PROTOCOL Presented by : EFA, Daniel Jr. G. VERGARA, Jonvon.
X.25 Protocol. 2 The X.25 Protocol CCITT Recommendation X.25 First Published in 1976 Revisions Every 4 Years , 1984, 1988 Interface Protocol for.
TELE202 Lecture 7 X.25 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Routing in WAN »Source: chapter 10 ¥This Lecture »X.25 »Source: chapter 10 ¥Next.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 – Circuit Switching and Packet Switching.
Layer Physical – WAN Pertemuan 10 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
WAN Technologies Dial-up modem connections Cheap Slow
Circuit Switching Blocking occurs when the network is unable to connect to stations because all possible paths between them are already in use. Non-blocking.
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
1 Pertemuan 25 High Speed Network Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 K. Salah Module 1.0: Introduction Definition Communication Model Type of networks –WAN –MAN –LAN, WLAN –PAN, WPAN Networking Technologies Network Switching.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
WAN Networking Protocols 1 WAN Connection Types Share bandwidth Frame Relay and X.25 56Kbps to 2.048Mps Point-to-Point connection No setup before transmission.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Section 8.1 Explain the role of carriers in WAN transmissions Compare and contrast DUN and VPN connections Explain the benefits of circuit switching Describe.
X.25 Overview Next The Mnemonic In Network Stack Page 05% 01 Layer7: The application Layer interfaces directly to and performs common application services.
CISCO NETWORKING ACADEMY Chabot College ELEC Wide Area Network Introduction.
Frame Relay Muhammad Wasif Laeeq Roll # : BSIT07-01.
WAN Technologies Dial-up modem connections
FRAME RELAY by Erdem YILMAZ. What is Frame Relay? high-performance WAN protocol operates at the physical and data link layers Originally designed for.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
National Institute of Science & Technology Voice Over Digital Subscriber Line (VoDSL) Vinay TibrewalEE [1] VoDSL: Next Generation Voice Solution.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
KARTIK DABBIRU Roll # EE
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Data Communication X.25 ~ Most widely used today ~ an interface between DTE and DCE for terminal operation at the packet mode on public data network. l.
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
Lecture Week 3 Frame Relay Accessing the WAN. 3.1 Basic Frame Relay Concepts Accessing the WAN.
© Agilent Technologies Copyright 2000 H7211A+212, Rev. 2.0 Review of WAN Protocol Basics.
BROADBAND ISDN Presented by Supreeti Mitra EI
FRAME RELAY. What is Frame Relay? high-performance WAN protocol operates at the physical and data link layers Originally designed for use across ISDN.
Data and Computer Communications Circuit Switching and Packet Switching.
Cabrillo College and Los Medanos College Building Cisco Remote Access Networks - X.25 Rick Graziani, Mark McGregor February 27, 2001.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
S6C6 – X.25 The “Grandfather” Technology. Disadvantages – On-Demand Connections Bandwidth is limited Connectivity is not constant Alternatives are: –"always.
Lecture 12 X.25. X.25 is a packet switching wide area network developed by ITU-T in Originally it was designed for private use Definition : X.25.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
William Stallings Data and Computer Communications
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
CSI-09 COMMUNICATION TECHNOLOGY WIDE AREA NETWORK (WAN) AUTHOR - V. V. SUBRAHMANYAM.
DATA LINK CONTROL PROTOCOLS. 2 Introduction Data link control layer – often abbreviated simply to data link layer – is concerned with the transfer of.
Mr. Mark Welton.  WAN transportation method that formats data into frames and sent over a network controlled by a service provider  Frame Relay is often.
Cisco 3 Frame Relay.
Communication Architecture and Network Protocol Layering Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by:
OSI ARCHITECTURE IN OSI, ACTUAL INFORMATION IS OVERHEADED BY PROTOCOL LAYERS IF ALL SEVEN LAYERS ARE OVERHEADED, THEN AS LITTLE AS 15% OF THE TRANSMITTED.
X.25 Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Virtual Circuit Networks Frame Relays. Background Frame Relay is a Virtual Circuit WAN that was designed in late 80s and early 90s. Prior to Frame Relays.
Frame Relay PVC Connection by Li, Sheng Wide-Area Network (WAN) Wide-Area Network (WAN)
Semester 4 – Chapter 6 - Frame Relay Frame Relay - Industry-standard, switched data- link layer protocol that handles multiple virtual circuits using HDLC.
 Introduction to Wide Area Networks 2 nd semester
Virtual Circuit Networks: Frame Relay And ATM UNIT 5 Chapter 18 Forouzan.
(11.6) Addressing Using International Data Number (X.121)
Section 8.1 Explain the role of carriers in WAN transmissions
WAN technologies.
Lecture 7: Data Link Layer Protocols (Part2): Frame Relay
Chapter 3: Open Systems Interconnection (OSI) Model
Components of a Frame Relay Network
Chapter 10 - X.25 and Network Management
Presentation transcript:

Technical Seminar Presentation 2004 GOURAV PODDAR IT [1] DATA SECURITY IN X.25 NETWORKS Advisor: Mr. Anisur Rahman

Technical Seminar Presentation 2004 GOURAV PODDAR IT [2] DATA SECURITY IN X.25 NETWORKS INTRODUCTION X.25 : An ITU-T protocol for WAN Communication. User to Network Interfacing (UNI); DTE – DCE Interface. Many channels share one physical connection. Security mechanism: Data Encryption for secrecy Data & Entity Authentication for preserving Data Integrity

Technical Seminar Presentation 2004 GOURAV PODDAR IT [3] DATA SECURITY IN X.25 NETWORKS X.25 Network Devices DTE – Data Terminal equipment DCE – Data Circuit-terminating Equipment PSE – Packet Switching Exchange PAD – Packet Assembler / Disassembler

Technical Seminar Presentation 2004 GOURAV PODDAR IT [4] DATA SECURITY IN X.25 NETWORKS X.25 Network Device Operation

Technical Seminar Presentation 2004 GOURAV PODDAR IT [5] DATA SECURITY IN X.25 NETWORKS Virtual Circuits Virtual Call Two Types of Virtual Circuits: Switched virtual circuit (SVC): Phone call Permanent virtual circuit (PVC): Leased lines Up to 4095 VCs on one X.25 interface

Technical Seminar Presentation 2004 GOURAV PODDAR IT [6] DATA SECURITY IN X.25 NETWORKS X.25 Protocol Suite PLP – Packet Layer Protocol LAPB – Link Access Procedure – Balanced X.21bis Protocol

Technical Seminar Presentation 2004 GOURAV PODDAR IT [7] DATA SECURITY IN X.25 NETWORKS Threats to Data Security in X.25 Passive Wiretap : Tapping into the carrier medium and reading the data. Active Interference : Modification of Data during transmission.

Technical Seminar Presentation 2004 GOURAV PODDAR IT [8] DATA SECURITY IN X.25 NETWORKS Security Requirements Operational Secure Key Management Approval

Technical Seminar Presentation 2004 GOURAV PODDAR IT [9] DATA SECURITY IN X.25 NETWORKS X.25 Security Problem The Key Management Problem General Layer 6 and 7 Layer 3

Technical Seminar Presentation 2004 GOURAV PODDAR IT [10] DATA SECURITY IN X.25 NETWORKS Basis of Solution Unit Unique RSA Keys Key Encrypting Keys (KEKs) Data Encrypting Keys (DEKs)

Technical Seminar Presentation 2004 GOURAV PODDAR IT [11] DATA SECURITY IN X.25 NETWORKS Fast RSA Processing Completely automated key management across the network Relies on RSA for the secure mechanisms Reliant on RSA co-processor in each crypto unit Power to perform a 512-bit RSA decryption under a second

Technical Seminar Presentation 2004 GOURAV PODDAR IT [12] DATA SECURITY IN X.25 NETWORKS CONCLUSION Developed to overcome the problems inherent in transmitting the data over low quality copper wires. Ensured reliable transmission of data over WAN with supported speed of up-to 56 Kbps. Added overhead and processing imposed on the transmission to achieve high level of reliability was a drawback. But still remains cost effective and viable alternative for low speed connectivity among many locations.

Technical Seminar Presentation 2004 GOURAV PODDAR IT [13] DATA SECURITY IN X.25 NETWORKS THANK YOU !