CompSci 314 S2 C Modern Data Communications Revision of lectures #2 to #11 Clark Thomborson 12 August 2010.

Slides:



Advertisements
Similar presentations
CSCI-1680 Physical Layer Link Layer I Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Analogue to Digital Conversion (PCM and DM)
Digital to Analog Many carrier facilities are analog Many transmission media are also analog (microwave, radio) We can carry digital values over analog.
ICSA 341 (Updated 12/2001) Encoding There are four types of encoding possible. –Digital Encoding of Digital Data –Digital Encoding of Analog Data –Analog.
1 Digital Data, Analog Signals (5.2) CSE 3213 Fall May 2015.
The Transmission of Binary Data in Communication Systems
Chapter 8: Data Communication Fundamentals Business Data Communications, 4e.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CSE331: Introduction to Networks and Security Lecture 21 Fall 2002.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Digital communications. Hams have developed techniques for transforming 1’s and 0’s into tones into the same frequency range as human voice. So now a.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
10/11/40 page 1 Department of Computer Engineering, Kasetsart University Introduction to Computer Communications and Networks CONSYL Data Encoding.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
COSC 3213 – Computer Networks I Summer 2003 Topics: 1. Line Coding (Digital Data, Digital Signals) 2. Digital Modulation (Digital Data, Analog Signals)
Lecture 3-1: Coding and Error Control
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CSCI-1680 Physical Layer Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Information Systems Security
Cryptography, Authentication and Digital Signatures
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Physical layer concepts
Chapter 8: Data Communication Fundamentals Business Data Communications, 4e.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
3-2008UP-Copyrights reserved1 ITGD4103 Data Communications and Networks Lecture-11:Data encoding techniques week 12- q-2/ 2008 Dr. Anwar Mousa University.
05 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Modulation Conversion of digital information to analog signals –Example: Telephone lines.
CSCI 465 Data Communications and Networks Lecture 7 Martin van Bommel CSCI 465 Data Communications and Networks 1.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
1 Introduction 4 Information transfer between two computers occurs in one of two types signals: digital or analog. Chapter 2 Introduction to Data Communication.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Chapter 7: Cryptographic Systems
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
TI Cellular Mobile Communication Systems Lecture 4 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
CSCI-1680 Physical Layer Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Digital modulation techniques. Modulations systems.
Frequency and Bandwidth A means of quantifying and interpreting media capacity.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 2 Fundamentals of Data and Signals
Review: The physical layer. Bandwidth/Capacity bit rate/baud rate How to determine the number of bits per symbol? Relation between the bandwidth and capacity:
Encoding How is information represented?. Way of looking at techniques Data Medium Digital Analog Digital Analog NRZ Manchester Differential Manchester.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
EKT 431 DIGITAL COMMUNICATIONS. MEETING LECTURE : 3 HOURS LABORATORY : 2 HOURS LECTURER PUAN NORSUHAIDA AHMAD /
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
1587: COMMUNICATION SYSTEMS 1 Digital Signals, modulation and noise Dr. George Loukas University of Greenwich,
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Fundamentals of Communications. Communication System Transmitter: originates the signal Receiver: receives transmitted signal after it travels over the.
Computer Security Revision Week
Chapter 4: Second generation Systems-Digital Modulation
Signal Encoding Techniques
CSCI-1680 Physical Layer Link Layer I
תקשורת מחשבים ואלגוריתמים מבוזרים
EEL 4598/5718: Computer Communications
Chapter 8: Data Communication Fundamentals
Encoding.
Presentation transcript:

CompSci 314 S2 C Modern Data Communications Revision of lectures #2 to #11 Clark Thomborson 12 August 2010

Page 2 Three Layers of Understanding 1.Terms, such as digital, analog, bit, signal, code; SI prefixes. –All terms used in the lecture slides are examinable. –You must be able to understand questions that are expressed in these terms. –You must be able to use these terms, accurately, in your responses. –You may be asked to define a term. 2.Concepts, such as information, bandwidth, compression. –All concepts discussed in the lecture slides are examinable. –You must have a “working understanding” of these concepts to get a B in this class. 3.Analyses, such as Fourier analysis, Shannon capacity. –All analyses illustrated in the lecture slides are examinable. –You will get an A on my portion of the exam if you are able to perform analyses under examination conditions, and if you are able to express your results in the appropriate terms.

Important Concepts Bits (information), signals (analog encodings of information), and symbols (digital encodings of information). Coding and decoding. Latency (s) and bandwidth (b/s, Baud). Variable-length and fixed-length codes. –Morse, Baudot, ASCII, UTF-8, UTF-32 (examinable for concepts e.g. escape codes, but not for specific codings) NRZ, NRZI, and Manchester signalling. Modulation and demodulation; modems. Period, frequency, amplitude, phase. Page 3

Important Concepts (2) Fourier transformation, DCT. SNR, dB. ASK, FSK, PSK (digital encodings). AM, FM, PM (analog encodings). Data compression techniques: –variable-length encoding (short codes for frequent symbols) –run-length encoding –encoding repeated strings by references/pointers –differential encoding. Data compression algorithms, at conceptual level only (detailed designs are not examinable): –Huffman, Lempel-Ziv, JPEG, MP3, MPEG4. Page 4

Important Concepts (3) Error detection, error correction. Single bit errors, burst errors. Parity: odd, even. Checksum, CRC, BCH, Reed-Solomon: conceptual level only (details will not be examined) Two-dimensional parity, Hamming code: you may be required to work an example on the exam, if you are provided important details (e.g. r1 is even parity on bits 1, 3, 5; r2 is even parity on bits 2, 3; r4 is even parity on bits 4, 5). Page 5

Important Concepts (4) Basic security goals: CIA, source authentication. Basic attacks: Interception, interruption, fabrication, modification. Darkside goals: interception, modification, interruption, fabrication, stegocommunication. –Note: basic security goals are attacks on darkside goals; basic attacks are darkside goals. Security functions: the gold standard, identification, non-repudiation. Page 6

Important Concepts (5) Encryption, decryption, keys (concepts, not details!) –Go back n, XOR, (DES, 3DES, AES, RSA) –Block ciphers, stream ciphers (CBC) Cryptographic hashes (SHA-256, SHA-512) Trust, trustworthiness Public key infrastructure (X.509) Page 7

Important Analyses Bandwidth and latency calculations –10 3 ≈ 2 10 ; 10.5 ≈ 3; log 10 3 ≈ 0.5; log ≈ 10 Fourier analysis of a square wave Signalling rate (Nyquist limit) Information rate (Shannon limit) Crypto-protocol analysis –Goals: message integrity, message confidentiality, source authentication. –Attack models: interceptions, interruptions, fabrications, modifications. –Techniques: symmetric encryption, asymmetric encryption, secure hashing, time stamps. (But not: Diffie-Hellman key exchange, complex protocols, cryptanalysis,...) Page 8