SlideShare a Scribd company logo
INTRODUCTION TO TELECOMMUNICATIONS
How old is Communications…. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
By Foot
Pigeons NO HACKING
Smoke Signals
Water Channels
Horses
Rail
Postal System
Telephone
 
DIGITAL EXCHANGE
 
Analogue or Digital Data Communications
Information Age ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collapsing Information Lag huge quantities of information transmitted in a fraction of a second. telegraph Information took days or weeks to be transmitted Information transmitted in minutes or hours Electronic communications sped up the rate of transmission of information, growth of telecommunications and especially computer networks globalization phenomenon (WWW) 1900 1950 2004-9 1850
Datacom Basics Broadband Communications ,[object Object],[object Object],[object Object],[object Object],Data Communications movement of computer information by means of electrical or optical transmission systems convergence
Network Types (based on Scale)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXAMPLE OF A NETWORK NMS Karachi STM1 via SMW3 (Singtel) Redundant PIX Firewall Existing Catalyst 4003 Switch Catalyst 6506 Switch NMS E3 via Satellite (Concert) BPX 8680 ATM Switch Redundant PIX Firewall Distribution Router Distribution Router Distribution Router 2xE3 (PDH) + 3xE1(SDH)   3xE3 (PDH) + 3xE1(SDH)  2xE3 SUN E450 SUN E450 SUN E450 E3 SMW3 (EMIX) Distribution Router Distribution Router Core Router E3 Satellite (Simplex) Rawalpindi Lahore Core Router BPX 8680 ATM Switch Core Router E3 Link Fast Ethernet STM1 Link Gigabit Ethernet Legend: S D H E W L E T T P A C K A R D S u r e S t o r e A u t o l o a d e r D L T 7 1 8 S D H E W L E T T P A C K A R D S u r e S t o r e A u t o l o a d e r D L T 7 1 8 BPX 8680 ATM Switch
Protocols

More Related Content

What's hot

Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
M Sabir Saeed
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationDarshan Maru
 
Advance wireless Introduction
Advance wireless IntroductionAdvance wireless Introduction
Advance wireless Introduction
izhar ul haq
 
Presentation wireless communication
Presentation wireless communicationPresentation wireless communication
Presentation wireless communicationcegonsoft1999
 
Wireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanWireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajan
Abhishek Mahajan
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless CommunicationAwais Alam
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU students
SURESHA V
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
rahuldaredia21
 
Introduction to telephony
Introduction to telephonyIntroduction to telephony
Introduction to telephony
PaloSanto Solutions
 
What is lora vs zigbee?
What is lora vs zigbee?What is lora vs zigbee?
What is lora vs zigbee?
Antenna Manufacturer Coco
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
Rituraj Tyagi
 
Next Generation Networks
Next Generation NetworksNext Generation Networks
Next Generation Networks
RejinaParvin
 
White Space Technology
White Space TechnologyWhite Space Technology
White Space Technology
Akshank Shah
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
Naaf Get
 
Wireless communication technology
Wireless communication technologyWireless communication technology
Wireless communication technologynnaaska
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmissionkavish dani
 
Wireless communicationpe-3855140
Wireless communicationpe-3855140Wireless communicationpe-3855140
Wireless communicationpe-3855140Pooja Shukla
 
Satellite
SatelliteSatellite
Satellite
ManjitRaushan1
 
Sky Con Presentation
Sky Con PresentationSky Con Presentation
Sky Con Presentation
Evert Bopp
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
M.k. Praveen
 

What's hot (20)

Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Advance wireless Introduction
Advance wireless IntroductionAdvance wireless Introduction
Advance wireless Introduction
 
Presentation wireless communication
Presentation wireless communicationPresentation wireless communication
Presentation wireless communication
 
Wireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanWireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajan
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU students
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
 
Introduction to telephony
Introduction to telephonyIntroduction to telephony
Introduction to telephony
 
What is lora vs zigbee?
What is lora vs zigbee?What is lora vs zigbee?
What is lora vs zigbee?
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Next Generation Networks
Next Generation NetworksNext Generation Networks
Next Generation Networks
 
White Space Technology
White Space TechnologyWhite Space Technology
White Space Technology
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
Wireless communication technology
Wireless communication technologyWireless communication technology
Wireless communication technology
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmission
 
Wireless communicationpe-3855140
Wireless communicationpe-3855140Wireless communicationpe-3855140
Wireless communicationpe-3855140
 
Satellite
SatelliteSatellite
Satellite
 
Sky Con Presentation
Sky Con PresentationSky Con Presentation
Sky Con Presentation
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
 

Similar to Chapter 1 Basics Of Information Transmission

WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
AbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
AbyThomas54
 
Lecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdfLecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdf
ssuser953ee81
 
Future Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication TechnologyFuture Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication Technology
AIMST University
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
WILLA REYES
 
16120816.ppt
16120816.ppt16120816.ppt
16120816.ppt
KareemNabil16
 
M1803037881
M1803037881M1803037881
M1803037881
IOSR Journals
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky FannyCarl Ford
 
L 1 overview of telecom network
L 1 overview of telecom networkL 1 overview of telecom network
L 1 overview of telecom network
Bala V
 
Optical Networks Infrastructure
Optical Networks InfrastructureOptical Networks Infrastructure
Optical Networks Infrastructure
Tal Lavian Ph.D.
 
6044847.ppt
6044847.ppt6044847.ppt
6044847.ppt
giri00767098
 
Stoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationStoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationJennifer Stoe
 
Wwwwww
WwwwwwWwwwww
BVH Network Technology Presentation
BVH   Network Technology PresentationBVH   Network Technology Presentation
BVH Network Technology Presentation
TomMcNamara
 
Mscict ns&i telecom networking
Mscict ns&i telecom networkingMscict ns&i telecom networking
Mscict ns&i telecom networking
Ramon Palacio Leon
 
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
ZiminJiang1
 
computer Network Abbreviations in class XII.pdf
computer Network Abbreviations in class XII.pdfcomputer Network Abbreviations in class XII.pdf
computer Network Abbreviations in class XII.pdf
seccoordpal
 
Network Technology Presentation Bvh V01
Network Technology Presentation   Bvh V01Network Technology Presentation   Bvh V01
Network Technology Presentation Bvh V01
TomMcNamara
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdf
Eshwar Prasad
 

Similar to Chapter 1 Basics Of Information Transmission (20)

WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
Lecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdfLecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdf
 
Future Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication TechnologyFuture Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication Technology
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
 
16120816.ppt
16120816.ppt16120816.ppt
16120816.ppt
 
M1803037881
M1803037881M1803037881
M1803037881
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
 
Final rohit bpl
Final rohit bplFinal rohit bpl
Final rohit bpl
 
L 1 overview of telecom network
L 1 overview of telecom networkL 1 overview of telecom network
L 1 overview of telecom network
 
Optical Networks Infrastructure
Optical Networks InfrastructureOptical Networks Infrastructure
Optical Networks Infrastructure
 
6044847.ppt
6044847.ppt6044847.ppt
6044847.ppt
 
Stoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationStoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission Presentation
 
Wwwwww
WwwwwwWwwwww
Wwwwww
 
BVH Network Technology Presentation
BVH   Network Technology PresentationBVH   Network Technology Presentation
BVH Network Technology Presentation
 
Mscict ns&i telecom networking
Mscict ns&i telecom networkingMscict ns&i telecom networking
Mscict ns&i telecom networking
 
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
 
computer Network Abbreviations in class XII.pdf
computer Network Abbreviations in class XII.pdfcomputer Network Abbreviations in class XII.pdf
computer Network Abbreviations in class XII.pdf
 
Network Technology Presentation Bvh V01
Network Technology Presentation   Bvh V01Network Technology Presentation   Bvh V01
Network Technology Presentation Bvh V01
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdf
 

More from management 2

Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Studymanagement 2
 
Chapter 9 Mis Library System
Chapter 9 Mis Library SystemChapter 9 Mis Library System
Chapter 9 Mis Library Systemmanagement 2
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support Systemmanagement 2
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erpmanagement 2
 
Chapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life CycleChapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life Cyclemanagement 2
 
Chapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai DabbawalasChapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai Dabbawalasmanagement 2
 
Chapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information SystemsChapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information Systemsmanagement 2
 
Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)management 2
 
Chapter 12 Toshiba Case Study
Chapter 12 Toshiba Case StudyChapter 12 Toshiba Case Study
Chapter 12 Toshiba Case Studymanagement 2
 
Chapter 18 Foundations Of Control
Chapter 18   Foundations Of ControlChapter 18   Foundations Of Control
Chapter 18 Foundations Of Controlmanagement 2
 
Chapter 16 Motivating Employees
Chapter 16   Motivating EmployeesChapter 16   Motivating Employees
Chapter 16 Motivating Employeesmanagement 2
 
Chapter 12 Human Resource Management
Chapter 12   Human Resource ManagementChapter 12   Human Resource Management
Chapter 12 Human Resource Managementmanagement 2
 
Chapter 8 Strategic Management
Chapter 8   Strategic ManagementChapter 8   Strategic Management
Chapter 8 Strategic Managementmanagement 2
 
Chapter 7 Foundations Of Planning
Chapter 7   Foundations Of PlanningChapter 7   Foundations Of Planning
Chapter 7 Foundations Of Planningmanagement 2
 
Chapter 6 Decision Making The Essence Of The Manager S Job
Chapter 6   Decision Making The Essence Of The Manager S JobChapter 6   Decision Making The Essence Of The Manager S Job
Chapter 6 Decision Making The Essence Of The Manager S Jobmanagement 2
 
Chapter 3 Organizational Culture And Environment The Constraints
Chapter 3   Organizational Culture And Environment The ConstraintsChapter 3   Organizational Culture And Environment The Constraints
Chapter 3 Organizational Culture And Environment The Constraintsmanagement 2
 
Chapter 2 The Evolution Of Management Theory Written In Different Manner
Chapter 2   The Evolution Of Management Theory  Written In Different MannerChapter 2   The Evolution Of Management Theory  Written In Different Manner
Chapter 2 The Evolution Of Management Theory Written In Different Mannermanagement 2
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theorymanagement 2
 

More from management 2 (20)

Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Study
 
Chapter 10 Sap
Chapter 10 SapChapter 10 Sap
Chapter 10 Sap
 
Chapter 9 Mis Library System
Chapter 9 Mis Library SystemChapter 9 Mis Library System
Chapter 9 Mis Library System
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support System
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Chapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life CycleChapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life Cycle
 
Chapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai DabbawalasChapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai Dabbawalas
 
Chapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information SystemsChapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information Systems
 
Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)
 
Chapter 12 Toshiba Case Study
Chapter 12 Toshiba Case StudyChapter 12 Toshiba Case Study
Chapter 12 Toshiba Case Study
 
Chapter 18 Foundations Of Control
Chapter 18   Foundations Of ControlChapter 18   Foundations Of Control
Chapter 18 Foundations Of Control
 
Chapter 16 Motivating Employees
Chapter 16   Motivating EmployeesChapter 16   Motivating Employees
Chapter 16 Motivating Employees
 
Chapter 12 Human Resource Management
Chapter 12   Human Resource ManagementChapter 12   Human Resource Management
Chapter 12 Human Resource Management
 
Chapter 8 Strategic Management
Chapter 8   Strategic ManagementChapter 8   Strategic Management
Chapter 8 Strategic Management
 
Chapter 7 Foundations Of Planning
Chapter 7   Foundations Of PlanningChapter 7   Foundations Of Planning
Chapter 7 Foundations Of Planning
 
Chapter 6 Decision Making The Essence Of The Manager S Job
Chapter 6   Decision Making The Essence Of The Manager S JobChapter 6   Decision Making The Essence Of The Manager S Job
Chapter 6 Decision Making The Essence Of The Manager S Job
 
Chapter 3 Organizational Culture And Environment The Constraints
Chapter 3   Organizational Culture And Environment The ConstraintsChapter 3   Organizational Culture And Environment The Constraints
Chapter 3 Organizational Culture And Environment The Constraints
 
Chapter 2 The Evolution Of Management Theory Written In Different Manner
Chapter 2   The Evolution Of Management Theory  Written In Different MannerChapter 2   The Evolution Of Management Theory  Written In Different Manner
Chapter 2 The Evolution Of Management Theory Written In Different Manner
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theory
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Chapter 1 Basics Of Information Transmission

  • 2.
  • 11.  
  • 13.  
  • 14. Analogue or Digital Data Communications
  • 15.
  • 16. Collapsing Information Lag huge quantities of information transmitted in a fraction of a second. telegraph Information took days or weeks to be transmitted Information transmitted in minutes or hours Electronic communications sped up the rate of transmission of information, growth of telecommunications and especially computer networks globalization phenomenon (WWW) 1900 1950 2004-9 1850
  • 17.
  • 18.
  • 19. EXAMPLE OF A NETWORK NMS Karachi STM1 via SMW3 (Singtel) Redundant PIX Firewall Existing Catalyst 4003 Switch Catalyst 6506 Switch NMS E3 via Satellite (Concert) BPX 8680 ATM Switch Redundant PIX Firewall Distribution Router Distribution Router Distribution Router 2xE3 (PDH) + 3xE1(SDH) 3xE3 (PDH) + 3xE1(SDH) 2xE3 SUN E450 SUN E450 SUN E450 E3 SMW3 (EMIX) Distribution Router Distribution Router Core Router E3 Satellite (Simplex) Rawalpindi Lahore Core Router BPX 8680 ATM Switch Core Router E3 Link Fast Ethernet STM1 Link Gigabit Ethernet Legend: S D H E W L E T T P A C K A R D S u r e S t o r e A u t o l o a d e r D L T 7 1 8 S D H E W L E T T P A C K A R D S u r e S t o r e A u t o l o a d e r D L T 7 1 8 BPX 8680 ATM Switch