100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Networking Methods and Protocols

Rating
-
Sold
1
Pages
80
Uploaded on
03-01-2022
Written in
2020/2021

This document is an 80-page summary with lots of images and text. The document goes through the structure of the OSI model, where it stands still per layer with an explanation of that part.

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
January 3, 2022
Number of pages
80
Written in
2020/2021
Type
Summary

Subjects

Content preview

SAMEN VATTING NMP
Networking Methods and Protocols


This will contain the following Weeks

1. Introduction & OSI
2. Physical
3. Datalink
4. Network
5. Transport
6. Application
7. Security


Richard Reijerse
S1128082


0

,Content
1 Global overview .............................................................................................................................. 2
1.1 Applications............................................................................................................................. 2
1.2 Things: Smart Objects ............................................................................................................. 2
1.3 Everything can be connected .................................................................................................. 3
1.4 Resources in a Network (DEFINITIONS) .................................................................................. 4
1.5 Expectations of reliable networks........................................................................................... 8
1.6 TCP/IP Model: a layered model ............................................................................................ 11
2 Physical.......................................................................................................................................... 12
2.1 Baseband transmission ......................................................................................................... 12
2.2 Passband transmission: multiple access to a medium ......................................................... 16
2.2.1 Analog ........................................................................................................................... 16
2.2.2 Digital ............................................................................................................................ 17
2.3 Wired media.......................................................................................................................... 23
2.4 Wireless Media ..................................................................................................................... 26
3 Datalink ......................................................................................................................................... 31
3.1 LLC & Requirements for media access .................................................................................. 32
3.2 Data send protocols .............................................................................................................. 33
3.3 Frames................................................................................................................................... 36
4 Network ........................................................................................................................................ 42
4.1 Network Layer Protocols....................................................................................................... 42
4.2 The IPv4 header .................................................................................................................... 43
4.3 The Need for IPv6.................................................................................................................. 43
4.4 IPv4 vs IPv6 Packet ................................................................................................................ 44
4.5 Testing and error handling IP ................................................................................................ 48
5 Transport....................................................................................................................................... 60
6 7: Security ..................................................................................................................................... 73
6.1 Security Definitions ............................................................................................................... 73




1

,1 Global overview
Religious
All
People
Political
Seem Financial
To Application
Need
Data Presentation
Processing Session
Transport
Network
Data Link
Physical
Figure 1 OSI model


1.1 Applications
− Smart grid (Energy)
− Industrial automation
− Smart cities and Urban Networks
− Home automation
− Building automation
− Structural health monitoring
− Container tracking
− Health monitoring




Figure 2 Network can be a connection between a lot of things



1.2 Things: Smart Objects
• Connect the analog and digital world
– Interaction with physical world
– Communication to outside world
• Components
– Sensor/actuator
– Microcontroller
– Storage
– Network
– Power




2

, 1.3 Everything can be connected
• Embedded systems
– Computer embedded in something other
than a computer (real-time)
• Ubiquitous computing
– Computing moves into everyday objects,
e.g. wearables
• Mobile telephony
– Ubiquitous always-on service, available
everywhere. Figure 3 Connection of smart objects, old and new
• Wireless Sensor Networks
– Smart dust
• Mobile computing
– Carry-around computers
• Computer Networking
– Computer communication via the Internet
• Telemetry & machine-machine communication
– Autonomic communication between non-human operated machines

Challenges for designing IoT things and networks
• Node-level
– Physical size
– Power
– Cost
• Network-level
– Large scale: thousands of nodes
• Network size: routing
• Data size
– Environment (QoS)
• Lossy networks
– Addressing
– Ad hoc: auto management (1 on 1)
– External access
• Security
– Privacy
• Ubiquitous data collection
• Who owns your (sensor) data?
– Cyber attacks
• DDoS
– From things with computers to computer with/doing things
• The Internet is a giant robot
– Physical safety
• Stuxnet
– Patching/updates
– Unauthorized access
• Physical
• Remote




3
$6.64
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
richardreijerse
1.0
(1)

Get to know the seller

Seller avatar
richardreijerse Hogeschool Windesheim
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
3 year
Number of followers
5
Documents
18
Last sold
6 months ago

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions