Importance of Networking and Security in Organizations
VerifiedAdded on 2023/06/06
|13
|3345
|99
AI Summary
This report discusses the importance of networking and security in organizations, covering different networking models and protocols used in the process. It covers packet switching, data link layer, network layer, transport layer and physical layer. The report also includes a self-assessment section and mentions the importance of connectivity devices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORKING AND SECURITY
Networking and Security
ITECH1102
Name of the Student
Name of the University
Author Note
Networking and Security
ITECH1102
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
NETWORKING AND SECURITY
Table of Contents
Overview of Networking and security.......................................................................................2
Packet switching and networking models..................................................................................3
Application layer........................................................................................................................4
Data link layer............................................................................................................................4
Network layer.............................................................................................................................5
Transport layer...........................................................................................................................6
Self-assessment........................................................................................................................10
Reference..................................................................................................................................11
NETWORKING AND SECURITY
Table of Contents
Overview of Networking and security.......................................................................................2
Packet switching and networking models..................................................................................3
Application layer........................................................................................................................4
Data link layer............................................................................................................................4
Network layer.............................................................................................................................5
Transport layer...........................................................................................................................6
Self-assessment........................................................................................................................10
Reference..................................................................................................................................11
2
NETWORKING AND SECURITY
Overview of Networking and security
This section of the report is to focus the importance of the networking and security for
the protection of the data which are transmitted from the source to the destination address in
an organization. It involves both hardware and software related to the organization. The
prime role and function of network and security in current computing is the protection of the
network used in an organization and data which is transmitted in an organization. The three
fundamental principles of networking security are availability, integrity and confidentiality.
The confidentiality is concerned with the prevention of the unauthorized disclosure of
essential information (Rawat & Reddy, 2017). The three prime objectives of integrity are
prevention from alteration of data, prevention of unauthorized users and availability refers to
the uninterrupted access to the information related to the system.
The hardware and software entities associated to networking and securities are cable,
firewall, router, DSL modems, VoIP systems and printers. The protocols and interaction
involved in the networking and security are DNDSC, Secure Socket Layer (SSL), Transport
Layer Security (TLS), secure IP (IPSec), Secure Hypertext transfer protocol (HTTPS), secure
e-mail (PGP and S/MIME). Security in cloud computing is very much an essential factor
considering the networking and security as the data which are stored in the cloud servers are
stored on the basis of the rules and regulation proposed by the cloud service providers. The
networking architecture is very much essential considering the networking and security as it
gives an idea about the security zones and layers in which the data is stored. Every IT
organization have an unique system which dedicatedly works for the network security
architecture and it needs to be modified according to the business situation.
NETWORKING AND SECURITY
Overview of Networking and security
This section of the report is to focus the importance of the networking and security for
the protection of the data which are transmitted from the source to the destination address in
an organization. It involves both hardware and software related to the organization. The
prime role and function of network and security in current computing is the protection of the
network used in an organization and data which is transmitted in an organization. The three
fundamental principles of networking security are availability, integrity and confidentiality.
The confidentiality is concerned with the prevention of the unauthorized disclosure of
essential information (Rawat & Reddy, 2017). The three prime objectives of integrity are
prevention from alteration of data, prevention of unauthorized users and availability refers to
the uninterrupted access to the information related to the system.
The hardware and software entities associated to networking and securities are cable,
firewall, router, DSL modems, VoIP systems and printers. The protocols and interaction
involved in the networking and security are DNDSC, Secure Socket Layer (SSL), Transport
Layer Security (TLS), secure IP (IPSec), Secure Hypertext transfer protocol (HTTPS), secure
e-mail (PGP and S/MIME). Security in cloud computing is very much an essential factor
considering the networking and security as the data which are stored in the cloud servers are
stored on the basis of the rules and regulation proposed by the cloud service providers. The
networking architecture is very much essential considering the networking and security as it
gives an idea about the security zones and layers in which the data is stored. Every IT
organization have an unique system which dedicatedly works for the network security
architecture and it needs to be modified according to the business situation.
3
NETWORKING AND SECURITY
The management of the threats and vulnerability in the network of an organization
helps in the growth and development of the organization. All the policies and regulations of
the company associated with essential data should be developed in such a way that it
becomes compatible with the network security of the organization as it will lead to the
growth and development of the organization itself.
Packet switching and networking models
The role and functions of the different types of networking models are used to
describe the type of network used by the organization; the packets which are routed through
the networks are examined using the source and destination address. There are specific
principles of communication for each of the networking models. The technologies associated
with this packet switching are the Local area network (LAN), Wide Area Network (WAN)
and the circuit switching technology. This type of networking model is used to group data
which is transmitted across a network of an organization into packets.
The basic structure of a packet includes payload and a header (Nozaki et al., 2015).
This type of networking model is the most widely used networking models in worldwide
computer networks. The data which is present in the header of this model are used by the
networking hardware. It is used to direct the packet to its destination where the payload is
extracted and are used by the application software.
The two major modes of packet switching are connectionless packet switching and
connection oriented packet switching. The format followed in the connectionless packet
switching are destination address, source address, total number of pieces and the sequence
number and in the connection oriented packet switching, data packets are sent sequentially
across a route (Diamantopoulos et al., 2015). Each packet is assigned with a sequence
NETWORKING AND SECURITY
The management of the threats and vulnerability in the network of an organization
helps in the growth and development of the organization. All the policies and regulations of
the company associated with essential data should be developed in such a way that it
becomes compatible with the network security of the organization as it will lead to the
growth and development of the organization itself.
Packet switching and networking models
The role and functions of the different types of networking models are used to
describe the type of network used by the organization; the packets which are routed through
the networks are examined using the source and destination address. There are specific
principles of communication for each of the networking models. The technologies associated
with this packet switching are the Local area network (LAN), Wide Area Network (WAN)
and the circuit switching technology. This type of networking model is used to group data
which is transmitted across a network of an organization into packets.
The basic structure of a packet includes payload and a header (Nozaki et al., 2015).
This type of networking model is the most widely used networking models in worldwide
computer networks. The data which is present in the header of this model are used by the
networking hardware. It is used to direct the packet to its destination where the payload is
extracted and are used by the application software.
The two major modes of packet switching are connectionless packet switching and
connection oriented packet switching. The format followed in the connectionless packet
switching are destination address, source address, total number of pieces and the sequence
number and in the connection oriented packet switching, data packets are sent sequentially
across a route (Diamantopoulos et al., 2015). Each packet is assigned with a sequence
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
NETWORKING AND SECURITY
number then transported to the destination address. Packet switched network are used as the
networking architecture for this model.
Application layer
Also known as the layer of abstraction this networking model specifies the shared
communication protocols and the interface methods. This type of standard model is used in
both the type of standard models such as the OSI model as well as the TCO/IP model. The
application layer is the top most layers present in the OSI model. This TCP/IP models
provides the interface between the application and network.
The application layer is used to exchange messages from one destination to another in
a network. One of the main functionality of this layer is that it is useful to get access for the
global information about the different types of services (Karagiannis et al., 2015). Different
types of messages which are sent to the destination folders can be managed with the help of
the application layer. The protocol followed in this type of networking layer focuses on the
process to process communication across an IP network.
The protocols used in this type of networking are File Transfer Protocol (FTP),
Simple Mail Transfer Protocol (SMTP), Trivial File Transfer Protocol (TFTP), Domain
Name System (DNS), Simple Network Management Protocol (SNMP) and Common
Management Information Protocol (CMIP). This type of networking model is used to provide
a communication interface and end-user service (Collina et al., 2014).
The prime responsibility of this layer is to enable the user of the network to access
the network. The support provided by this layer are like shared data management and e-mail.
NETWORKING AND SECURITY
number then transported to the destination address. Packet switched network are used as the
networking architecture for this model.
Application layer
Also known as the layer of abstraction this networking model specifies the shared
communication protocols and the interface methods. This type of standard model is used in
both the type of standard models such as the OSI model as well as the TCO/IP model. The
application layer is the top most layers present in the OSI model. This TCP/IP models
provides the interface between the application and network.
The application layer is used to exchange messages from one destination to another in
a network. One of the main functionality of this layer is that it is useful to get access for the
global information about the different types of services (Karagiannis et al., 2015). Different
types of messages which are sent to the destination folders can be managed with the help of
the application layer. The protocol followed in this type of networking layer focuses on the
process to process communication across an IP network.
The protocols used in this type of networking are File Transfer Protocol (FTP),
Simple Mail Transfer Protocol (SMTP), Trivial File Transfer Protocol (TFTP), Domain
Name System (DNS), Simple Network Management Protocol (SNMP) and Common
Management Information Protocol (CMIP). This type of networking model is used to provide
a communication interface and end-user service (Collina et al., 2014).
The prime responsibility of this layer is to enable the user of the network to access
the network. The support provided by this layer are like shared data management and e-mail.
5
NETWORKING AND SECURITY
Data link layer
The main functionality of this layer is that it ensures that the messages which are sent
to the destination address from the source are free from any kinds of errors. The other main
functions of this layer are managing flow control, framing, access control. The protocols
followed in this layer ensure that the speed of the data received do not affect the overall
network as both the network have different characteristics (Carthern et al., 2015).
The data link layer receives the data from the network layer and divides that into
smaller fragments known as the frames. The addressing information are provided with the
help of the header. The physical addresses of the source and destination machines are added
to each of the fames before the transmission process (Lopacinski et al., 2015).
The most common protocols used in the data link layer are ATM, ARCnet, LattisNet,
Cisco Discivery Protocol (CDP), Controller Area Network (CAN), Ethernet, Econet, Frame
relay, Fiber Distributed Data Interface (FDDI), Ethernet Automatic Protection Switching
(EAPS), High level Data link control (HDLC), StarLan, Token ring, Link Access procedures
D channel (LAPD), Link Layer Discovery Protocol (LLDP), Local talk, MIL- STD-1553,
Multi-Protocol Label Switching (MPLS), Nortel Discovery Protocol (NDP), Point to Point
(PPP), Profibus, Split Multi-link trunking (SMLT), Spanning Tree Protocol, Unidirectional
Link Detection (UDLD) and 1-wire.
The architecture followed in this layer are the two layers, logical link control sub
layer which multiplexes protocols at the top of the data link layer and media access control
sub layer performs the authentication role in the network.
NETWORKING AND SECURITY
Data link layer
The main functionality of this layer is that it ensures that the messages which are sent
to the destination address from the source are free from any kinds of errors. The other main
functions of this layer are managing flow control, framing, access control. The protocols
followed in this layer ensure that the speed of the data received do not affect the overall
network as both the network have different characteristics (Carthern et al., 2015).
The data link layer receives the data from the network layer and divides that into
smaller fragments known as the frames. The addressing information are provided with the
help of the header. The physical addresses of the source and destination machines are added
to each of the fames before the transmission process (Lopacinski et al., 2015).
The most common protocols used in the data link layer are ATM, ARCnet, LattisNet,
Cisco Discivery Protocol (CDP), Controller Area Network (CAN), Ethernet, Econet, Frame
relay, Fiber Distributed Data Interface (FDDI), Ethernet Automatic Protection Switching
(EAPS), High level Data link control (HDLC), StarLan, Token ring, Link Access procedures
D channel (LAPD), Link Layer Discovery Protocol (LLDP), Local talk, MIL- STD-1553,
Multi-Protocol Label Switching (MPLS), Nortel Discovery Protocol (NDP), Point to Point
(PPP), Profibus, Split Multi-link trunking (SMLT), Spanning Tree Protocol, Unidirectional
Link Detection (UDLD) and 1-wire.
The architecture followed in this layer are the two layers, logical link control sub
layer which multiplexes protocols at the top of the data link layer and media access control
sub layer performs the authentication role in the network.
6
NETWORKING AND SECURITY
Network layer
The prime functionality of the network layer is to authenticate each of the different
networks which are connected in a private network. This layer helps in forwarding the
packets to the network routers. The protocol followed in this layer is based on algorithms
which are used to determine the best paths for the data from the source to the destination
folder. The paths which are followed in this type of networking model are known as virtual
circuits.
The architecture of this layer has different functionalities such as the logical
addressing, routing, path determination and fragmentation (Qadir et al., 2015). The IP
addressing is also known as logical addressing which is defined as this layer of the OSI
model. The method of routing a data from the source and destination is known as routing.
The protocols which operated in the network layer are Routing Information Protocol
(RIP), Protocol Independent Multicast (PIM), Open Shortest Path First (OSPF), Internetwork
Packer exchange (IPX), IPv4, IPv6 internet protocol, Internet Protocol Security (IPsec),
Internet Group Management Protocol (IGMP), Internet Control Message Protocol (ICMP),
Enhanced Interior Gateway Routing Protocol (IGRP), Exterior Gateway Protocol (EGP),
Datagram Delivery Protocol (DDP) and the Connectionless-mode Network Service (CLNP).
The limitations of the received data are one of the reasons behind the fragmentation
process. The other functionality of this model is the path determination which determines the
path topology between the two devices.
Transport layer
The main functionalities of this protocol involve the use of TCP, UDP, DCCP, SCTP
and RSVP. The architecture of this networking model provides services such as connection
NETWORKING AND SECURITY
Network layer
The prime functionality of the network layer is to authenticate each of the different
networks which are connected in a private network. This layer helps in forwarding the
packets to the network routers. The protocol followed in this layer is based on algorithms
which are used to determine the best paths for the data from the source to the destination
folder. The paths which are followed in this type of networking model are known as virtual
circuits.
The architecture of this layer has different functionalities such as the logical
addressing, routing, path determination and fragmentation (Qadir et al., 2015). The IP
addressing is also known as logical addressing which is defined as this layer of the OSI
model. The method of routing a data from the source and destination is known as routing.
The protocols which operated in the network layer are Routing Information Protocol
(RIP), Protocol Independent Multicast (PIM), Open Shortest Path First (OSPF), Internetwork
Packer exchange (IPX), IPv4, IPv6 internet protocol, Internet Protocol Security (IPsec),
Internet Group Management Protocol (IGMP), Internet Control Message Protocol (ICMP),
Enhanced Interior Gateway Routing Protocol (IGRP), Exterior Gateway Protocol (EGP),
Datagram Delivery Protocol (DDP) and the Connectionless-mode Network Service (CLNP).
The limitations of the received data are one of the reasons behind the fragmentation
process. The other functionality of this model is the path determination which determines the
path topology between the two devices.
Transport layer
The main functionalities of this protocol involve the use of TCP, UDP, DCCP, SCTP
and RSVP. The architecture of this networking model provides services such as connection
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
NETWORKING AND SECURITY
oriented communication, flow control, multiplexing and reliability. The connection oriented
communication is done using a data stream. The reliability of this model ensures the security
of the message which is prone to networking vulnerabilities. The rate of sending messages
can be controlled and managed with the help of the flow control; it increases the efficiency of
the network. The problem of using more than one network service is managed by the
multiplexing capabilities of this model (Rescorla, 2018).
The protocols used in this layer are Apple talk transaction protocol, datagram
congestion control protocol, multipath TCP, Reliable data protocol, Reliable user datagram
protocol, sequenced packet exchange, structured stream transport, transmission control
protocol, user data gram protocol and micro transport protocol.
UDP
The protocol of this layer provides host to host communication services for different
kinds of communications. The packet header size of UDP is 8 byte. The typical data packet
over head is 8 byte. Datagram is used as the transport layer packet entity in UDP. The
checksum size of UDP is 16 bits.
UDP- Lite
The header packet size of UDP-Lite is 8 bytes. The packet header size of UDP-Lite is
8 bytes. Datagram is used as the transport layer packet entity in UDP-Lite. The checksum
size of UDP-Lite is 16 bits.
TCP
NETWORKING AND SECURITY
oriented communication, flow control, multiplexing and reliability. The connection oriented
communication is done using a data stream. The reliability of this model ensures the security
of the message which is prone to networking vulnerabilities. The rate of sending messages
can be controlled and managed with the help of the flow control; it increases the efficiency of
the network. The problem of using more than one network service is managed by the
multiplexing capabilities of this model (Rescorla, 2018).
The protocols used in this layer are Apple talk transaction protocol, datagram
congestion control protocol, multipath TCP, Reliable data protocol, Reliable user datagram
protocol, sequenced packet exchange, structured stream transport, transmission control
protocol, user data gram protocol and micro transport protocol.
UDP
The protocol of this layer provides host to host communication services for different
kinds of communications. The packet header size of UDP is 8 byte. The typical data packet
over head is 8 byte. Datagram is used as the transport layer packet entity in UDP. The
checksum size of UDP is 16 bits.
UDP- Lite
The header packet size of UDP-Lite is 8 bytes. The packet header size of UDP-Lite is
8 bytes. Datagram is used as the transport layer packet entity in UDP-Lite. The checksum
size of UDP-Lite is 16 bits.
TCP
8
NETWORKING AND SECURITY
The packet header size of TCP is between 20-60 bytes and typical data packet
overhead is 20 bytes. Segment is used in the transport layer packet entity. The checksum size
of TCP is 16 bits.
Multipath TCP
The packer header size of multi path TCP is between 50-90 bytes. Segment is used as
the transport layer packet entity in this type protocol. This is a connection oriented protocol
and provides reliable data transmission. The checksum size of the multipath TCP is 16 bits
and do not supports partial checksum, it have exquisite features such as flow control and
congestion control and supports multiple homing.
SCTP
The packet header size of SCTP is 12 bytes and the typical data packet overhead is
between 44-48 bytes. Datagram is used as a transport layer packet entity. This protocol is a
connection oriented protocol and it provides reliable as well as unreliable transport. The
checksum size of this type of protocol is 32 bits with no partial checksum. Congestion control
with congestion notification is an integral part of this protocol. It supports multiple stream,
bundling and multiple homing.
DCCP
It is a connection oriented protocol which preserves message boundary. The packet
header size of this protocol and the typical data packet overhead is either 12 or 16 bytes.
Datagram is used as the transport layer packet entity in this type of protocol. It checks data
NETWORKING AND SECURITY
The packet header size of TCP is between 20-60 bytes and typical data packet
overhead is 20 bytes. Segment is used in the transport layer packet entity. The checksum size
of TCP is 16 bits.
Multipath TCP
The packer header size of multi path TCP is between 50-90 bytes. Segment is used as
the transport layer packet entity in this type protocol. This is a connection oriented protocol
and provides reliable data transmission. The checksum size of the multipath TCP is 16 bits
and do not supports partial checksum, it have exquisite features such as flow control and
congestion control and supports multiple homing.
SCTP
The packet header size of SCTP is 12 bytes and the typical data packet overhead is
between 44-48 bytes. Datagram is used as a transport layer packet entity. This protocol is a
connection oriented protocol and it provides reliable as well as unreliable transport. The
checksum size of this type of protocol is 32 bits with no partial checksum. Congestion control
with congestion notification is an integral part of this protocol. It supports multiple stream,
bundling and multiple homing.
DCCP
It is a connection oriented protocol which preserves message boundary. The packet
header size of this protocol and the typical data packet overhead is either 12 or 16 bytes.
Datagram is used as the transport layer packet entity in this type of protocol. It checks data
9
NETWORKING AND SECURITY
sum and the checksum size of this protocol is 16 bits. Congestion control is present in thgis
type of protocol along with the congestion notification.
RUDP
This is a connection oriented protocol having a packet size of 14 bytes and typical
data packet overhead of 14 bytes. Datagram is used as the transport layer packet entity in
RUDP. It supports both reliable and unreliable transport. The checksum size of this protocol
is 16 bits and it supports flow control but do not support multiple streams and multi homing.
Physical layer
This is the lowest layer among all the different layers of the OSI models; this layer
consists of the electronic transmission technologies of a network. The physical layer help in
transmitting raw bits rather than logical data packets over the physical data link connecting
network nodes. The prime objective of this networking model is the transmission of the
logical communications requests from the data link layer to the hardware specific operations
(Zou et al., 2015).
The other major tasks of this layer is the modulation, line coding, bit
synchronization ,circuit switching, training sequences, bit interleaving, pulse shaping,
forward error correction. The architecture associated with this model is concerned with the bit
rate, different types of line configurations, communication processes and auto negotiation.
The technologies associated with this layer such the DSL, CAN bus, Bluetooth, ARINC 818
and ether loop plays a vital role to play in different kinds of activities in the network (Fay et
al., 2016).
The fundamental equipment required for this technology are repeater, Ethernet hub,
modem and fiber media converter. The physical layer helps in the providing procedural,
NETWORKING AND SECURITY
sum and the checksum size of this protocol is 16 bits. Congestion control is present in thgis
type of protocol along with the congestion notification.
RUDP
This is a connection oriented protocol having a packet size of 14 bytes and typical
data packet overhead of 14 bytes. Datagram is used as the transport layer packet entity in
RUDP. It supports both reliable and unreliable transport. The checksum size of this protocol
is 16 bits and it supports flow control but do not support multiple streams and multi homing.
Physical layer
This is the lowest layer among all the different layers of the OSI models; this layer
consists of the electronic transmission technologies of a network. The physical layer help in
transmitting raw bits rather than logical data packets over the physical data link connecting
network nodes. The prime objective of this networking model is the transmission of the
logical communications requests from the data link layer to the hardware specific operations
(Zou et al., 2015).
The other major tasks of this layer is the modulation, line coding, bit
synchronization ,circuit switching, training sequences, bit interleaving, pulse shaping,
forward error correction. The architecture associated with this model is concerned with the bit
rate, different types of line configurations, communication processes and auto negotiation.
The technologies associated with this layer such the DSL, CAN bus, Bluetooth, ARINC 818
and ether loop plays a vital role to play in different kinds of activities in the network (Fay et
al., 2016).
The fundamental equipment required for this technology are repeater, Ethernet hub,
modem and fiber media converter. The physical layer helps in the providing procedural,
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
NETWORKING AND SECURITY
electrical, mechanical interface to the transmission medium. The network equipment of this
layer is network interface controller, repeater, Ethernet hub, modem, fiber media converter.
Self-assessment
Based on the above discussion the importance of the different networking models can
be acknowledged. Since most of the industries are now interconnected with private networks
which the role of connectivity is increasing every day. Network connectivity is one of the
ways by which an organisation can maintain the security and privacy of their personal
networks.
The most common connectivity devices used are the NIC, Hub, switch, bridge,
transceivers, wireless access points, router and gateway (Sinha et al., 2017). The hybrid
networking devices used in current computing is multilayer switches, protocol converters,
bridge routers, proxy servers and firewalls. The different types of hardware networking
devices are Ethernet adapters, file server, database server, storage areas, and network
services. There are different kinds of protocols used in the network communications such as
the network communication protocols, network management protocols and network security
protocols.
Network security protocols are the data communication protocols such as the TCP/IP
and HTTP. Each of the network models discussed in this report have different specifications
and services, each layers have to be maintained and managed by the organisation so that there
are no issues related to the network as it is of the most used medium for the growth and
development of the organisation.
NETWORKING AND SECURITY
electrical, mechanical interface to the transmission medium. The network equipment of this
layer is network interface controller, repeater, Ethernet hub, modem, fiber media converter.
Self-assessment
Based on the above discussion the importance of the different networking models can
be acknowledged. Since most of the industries are now interconnected with private networks
which the role of connectivity is increasing every day. Network connectivity is one of the
ways by which an organisation can maintain the security and privacy of their personal
networks.
The most common connectivity devices used are the NIC, Hub, switch, bridge,
transceivers, wireless access points, router and gateway (Sinha et al., 2017). The hybrid
networking devices used in current computing is multilayer switches, protocol converters,
bridge routers, proxy servers and firewalls. The different types of hardware networking
devices are Ethernet adapters, file server, database server, storage areas, and network
services. There are different kinds of protocols used in the network communications such as
the network communication protocols, network management protocols and network security
protocols.
Network security protocols are the data communication protocols such as the TCP/IP
and HTTP. Each of the network models discussed in this report have different specifications
and services, each layers have to be maintained and managed by the organisation so that there
are no issues related to the network as it is of the most used medium for the growth and
development of the organisation.
11
NETWORKING AND SECURITY
Reference
Carthern, C., Wilson, W., Bedwell, R., & Rivera, N. (2015). Data Link Layer. In Cisco
Networks (pp. 35-48). Apress, Berkeley, CA.
Collina, M., Bartolucci, M., Vanelli-Coralli, A., & Corazza, G. E. (2014, September). Internet
of Things application layer protocol analysis over error and delay prone links.
In Advanced Satellite Multimedia Systems Conference and the 13th Signal Processing
for Space Communications Workshop (ASMS/SPSC), 2014 7th (pp. 398-404). IEEE.
Diamantopoulos, N. P., Hayashi, M., Yoshida, Y., Maruta, A., Maruyama, R., Kuwaki, N., ...
& Kitayama, K. (2015). Mode-selective optical packet switching in mode-division
multiplexing networks. Optics express, 23(18), 23660-23666.
Fay, L., Michael, L., Gómez-Barquero, D., Ammar, N., & Caldwell, M. W. (2016). An
overview of the ATSC 3.0 physical layer specification. IEEE Transactions on
Broadcasting, 62(1), 159-171.
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A
survey on application layer protocols for the internet of things. Transaction on IoT
and Cloud Computing, 3(1), 11-17.
Lopacinski, L., Brzozowski, M., Nolte, J., Kraemer, R., & Buechner, S. (2015, October).
Parallel RS error correction structures dedicated for 100 Gbps wireless data link layer.
In Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference
on (pp. 1-6). IEEE.
NETWORKING AND SECURITY
Reference
Carthern, C., Wilson, W., Bedwell, R., & Rivera, N. (2015). Data Link Layer. In Cisco
Networks (pp. 35-48). Apress, Berkeley, CA.
Collina, M., Bartolucci, M., Vanelli-Coralli, A., & Corazza, G. E. (2014, September). Internet
of Things application layer protocol analysis over error and delay prone links.
In Advanced Satellite Multimedia Systems Conference and the 13th Signal Processing
for Space Communications Workshop (ASMS/SPSC), 2014 7th (pp. 398-404). IEEE.
Diamantopoulos, N. P., Hayashi, M., Yoshida, Y., Maruta, A., Maruyama, R., Kuwaki, N., ...
& Kitayama, K. (2015). Mode-selective optical packet switching in mode-division
multiplexing networks. Optics express, 23(18), 23660-23666.
Fay, L., Michael, L., Gómez-Barquero, D., Ammar, N., & Caldwell, M. W. (2016). An
overview of the ATSC 3.0 physical layer specification. IEEE Transactions on
Broadcasting, 62(1), 159-171.
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A
survey on application layer protocols for the internet of things. Transaction on IoT
and Cloud Computing, 3(1), 11-17.
Lopacinski, L., Brzozowski, M., Nolte, J., Kraemer, R., & Buechner, S. (2015, October).
Parallel RS error correction structures dedicated for 100 Gbps wireless data link layer.
In Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference
on (pp. 1-6). IEEE.
12
NETWORKING AND SECURITY
Nozaki, K., Lacraz, A., Shinya, A., Matsuo, S., Sato, T., Takeda, K., ... & Notomi, M. (2015).
All-optical switching for 10-Gb/s packet data by using an ultralow-power optical
bistability of photonic-crystal nanocavities. Optics express, 23(23), 30379-30392.
Qadir, J., Ali, A., Yau, K. L. A., Sathiaseelan, A., & Crowcroft, J. (2015). Exploiting the
power of multiplicity: a holistic survey of network-layer multipath. IEEE
Communications Surveys & Tutorials, 17(4), 2176-2213.
Rawat, D. B., & Reddy, S. R. (2017). Software defined networking architecture, security and
energy efficiency: A survey. environment, 3(5), 6.
Rescorla, E. (2018). The transport layer security (TLS) protocol version 1.3 (No. RFC 8446).
Sinha, P., Jha, V. K., Rai, A. K., & Bhushan, B. (2017, July). Security vulnerabilities, attacks
and countermeasures in wireless sensor networks at various layers of OSI reference
model: A survey. In Signal Processing and Communication (ICSPC), 2017
International Conference on (pp. 288-293). IEEE.
Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in
wireless communications using diversity techniques. IEEE Network, 29(1), 42-48.
NETWORKING AND SECURITY
Nozaki, K., Lacraz, A., Shinya, A., Matsuo, S., Sato, T., Takeda, K., ... & Notomi, M. (2015).
All-optical switching for 10-Gb/s packet data by using an ultralow-power optical
bistability of photonic-crystal nanocavities. Optics express, 23(23), 30379-30392.
Qadir, J., Ali, A., Yau, K. L. A., Sathiaseelan, A., & Crowcroft, J. (2015). Exploiting the
power of multiplicity: a holistic survey of network-layer multipath. IEEE
Communications Surveys & Tutorials, 17(4), 2176-2213.
Rawat, D. B., & Reddy, S. R. (2017). Software defined networking architecture, security and
energy efficiency: A survey. environment, 3(5), 6.
Rescorla, E. (2018). The transport layer security (TLS) protocol version 1.3 (No. RFC 8446).
Sinha, P., Jha, V. K., Rai, A. K., & Bhushan, B. (2017, July). Security vulnerabilities, attacks
and countermeasures in wireless sensor networks at various layers of OSI reference
model: A survey. In Signal Processing and Communication (ICSPC), 2017
International Conference on (pp. 288-293). IEEE.
Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in
wireless communications using diversity techniques. IEEE Network, 29(1), 42-48.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.