SlideShare a Scribd company logo
Identify and discuss the differences between telecommunications protocols. What are critical
elements, how do they operate, what are their vulnerabilities other than cyber based attacks.
Solution
In a large organization the distinction of telecommunications and networking can vary depending
how the organization is structured. I've worked in smaller companies where anything technology
related came under the responsibility of the IT (information technology) department. In larger
organizations the roles get a bit more defined and separated. For instance, in a large organization
someone specializing in telecommunications may have little or no role in understanding
computer servers and network operating systems.
I am answering this from my very personal perspective. I began working in the 1970s in
telecommunications. In the military that meant I installed and repaired radio communications
and telephone equipment. In the commercial world I had an FCC (Federal Communications
License) which allowed me to work on radio communications equipment.
In the 1990s I began working in computer networking, which would be IT (information
technology). I see the distinction there as information is data driven. My responsibilities are
computer servers and network operating systems. The basic premise of a computer network is to
share a resource. The device which allows the resource top be shared is a server. For instance, a
print server allows a printer to be shared, a file server allows files to be shared.
In my current position my title includes "telecommunications and networking." My
telecommunications responsibilities include telephones. Now with IP (internet protocol) based
phones, you have the questions of, is it a phone system problem, or a network problem. The
separation was a lot "cleaner" as far as responsibilities before IP based phones. My
telecommunications responsibilities also include things like the internal network wiring and
dealing with the external issues regarding the connectivity to the building. My networking (IT)
responsibilities are the maintenance of the computer servers and the network operating systems
that allow resources to be shared.
In telecommunications terminology, the word protocol is used to address some specified sets of
rules and regulations that govern the process of digital information exchange between two distant
entities. Further, as telecommunications is a vast field that embodies many communication
technologies, multiple protocols work in different areas of digital communication to serve the
process of data exchange. Some major areas include PSTN (public switched telephone network)
communication protocols, cellular communication protocols, data networking protocols and
hybrid communication protocols.
PSTN Protocol
PSTN protocols (or telephonic communication protocols) are the oldest communication
protocols in action, and generally regulate the process of communication between local
exchanges, home telephones and gateway exchanges. Some major protocols include SS7
(signaling system 7), SCTP (stream control transmission protocol), V5.1/V5.2 protocols and
ISDN (integrated services digital network) protocols. These protocols primarily serve the voice
communication procedures within a PSTN.
Cellular Communication Protocols
Cellular communication employs transmitting data towards mobile data units roaming within the
coverage area. This communication procedure is a prevalent method of data communications,
and it has many different specially designed protocols for its data exchanging and transmission
controlling procedures. Some common cellular communication protocols include BSMAP (base
station management application part), BSSMAP (base station subsystem management
application part), BSSAP (base station subsystem application part), DTAP (direct transfer
application part), SMSTP (short message service transfer layer protocol), BTSM (base
transceiver station management) and MAP (mobile application part).
Data Communication Protocols
The domain of data communication includes all the local, private and public networks that
employ computers for exchanging data among users. Some examples of these are local area
networks, metropolitan area networks, wide area networks and the network of networks -- the
Internet. These networks use various sets of communication protocols to regulate and control the
process of data communication, and some major ones include TCP (transmission control
protocol), IP (Internet protocol), FTP (file transport protocol), HTTP (hyper-text transfer
protocol), POP (post office protocol), SMTP (simple mail transfer protocol), DHCP (dynamic
host control protocol), BGP (border gateway protocol), UDP (unified datagram protocol), RTP
(real time protocol) and RSVP (reservation control protocol).
VoIP Protocols
VoIP (Voice over Internet Protocol) is a communication technology that provides solutions of
transferring voice, multimedia, and text-based data simultaneously over a single carrier. This
technology is developed by amalgamating data networks and PSTN, and for this reason, it uses
many protocols from both mentioned categories of telecommunication systems. It has some
specific protocols developed for its core operations as well, which mainly include MGCP (media
gateway control protocol), SIP (session initiation protocol), H.323, H.248, SDP (session
description protocol), SAP (session announcement protocol), MIME (multipurpose Internet mail
extensions) and SGCP (signaling gateway control protocol).
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's
information assurance. Vulnerability is the intersection of three elements: a system susceptibility
or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a
vulnerability, an attacker must have at least one applicable tool or technique that can connect to a
system weakness. In this frame, vulnerability is also known as the attack surface.
Vulnerability management is the cyclical practice of identifying, classifying, remediating, and
mitigating vulnerabilities. This practice generally refers to software vulnerabilities in computing
systems.
A security risk may be classified as a vulnerability. The use of vulnerability with the same
meaning of risk can lead to confusion. The risk is tied to the potential of a significant loss. Then
there are vulnerabilities without risk: for example when the affected asset has no value. A
vulnerability with one or more known instances of working and fully implemented attacks is
classified as an exploitable vulnerability — a vulnerability for which an exploit exists. The
window of vulnerability is the time from when the security hole was introduced or manifested in
deployed software, to when access was removed, a security fix was available/deployed, or the
attacker was disabled—see zero-day attack.
Security bug (security defect) is a narrower concept: there are vulnerabilities that are not related
to software: hardware, site, personnel vulnerabilities are examples of vulnerabilities that are not
software security bugs.

More Related Content

Similar to Identify and discuss the differences between telecommunications prot.pdf

Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Deven Sahu
 
Telecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To CommunicateTelecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To Communicate
Eric Ronald
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
Renee Jones
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and NetworksChristian Reina
 
Switching systems lecture1
Switching  systems lecture1Switching  systems lecture1
Switching systems lecture1
Jumaan Ally Mohamed
 
Data Communication, Networking & Internet
Data Communication, Networking & InternetData Communication, Networking & Internet
Data Communication, Networking & InternetKusai007
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
IJCSIS Research Publications
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
Mukesh Tekwani
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
Susan Cox
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
 
UM MBA Program: Overview Of Internet Technology
UM MBA Program: Overview Of Internet TechnologyUM MBA Program: Overview Of Internet Technology
UM MBA Program: Overview Of Internet Technology
William J. Brown
 
17 130920091458-phpapp01
17 130920091458-phpapp0117 130920091458-phpapp01
17 130920091458-phpapp01Dilan Atapattu
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
LinaCovington707
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05Anuja Lad
 
Hightech
Hightech Hightech
Hightech
Saimir Dine
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
MohammedAnas871930
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
Jaleto Sunkemo
 

Similar to Identify and discuss the differences between telecommunications prot.pdf (20)

Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Telecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To CommunicateTelecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To Communicate
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Switching systems lecture1
Switching  systems lecture1Switching  systems lecture1
Switching systems lecture1
 
Data Communication, Networking & Internet
Data Communication, Networking & InternetData Communication, Networking & Internet
Data Communication, Networking & Internet
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
UM MBA Program: Overview Of Internet Technology
UM MBA Program: Overview Of Internet TechnologyUM MBA Program: Overview Of Internet Technology
UM MBA Program: Overview Of Internet Technology
 
17 130920091458-phpapp01
17 130920091458-phpapp0117 130920091458-phpapp01
17 130920091458-phpapp01
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
Hightech
Hightech Hightech
Hightech
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 

More from ellanorfelicityri239

How to Read the City Evaluating evidence to generate informed urban .pdf
How to Read the City Evaluating evidence to generate informed urban .pdfHow to Read the City Evaluating evidence to generate informed urban .pdf
How to Read the City Evaluating evidence to generate informed urban .pdf
ellanorfelicityri239
 
How do transpiration, cohesion and adhesion all work together to pro.pdf
How do transpiration, cohesion and adhesion all work together to pro.pdfHow do transpiration, cohesion and adhesion all work together to pro.pdf
How do transpiration, cohesion and adhesion all work together to pro.pdf
ellanorfelicityri239
 
How can the Internet be used for competitive advantage in business .pdf
How can the Internet be used for competitive advantage in business .pdfHow can the Internet be used for competitive advantage in business .pdf
How can the Internet be used for competitive advantage in business .pdf
ellanorfelicityri239
 
give an example of an qualitative variablegive an example of.pdf
give an example of an qualitative variablegive an example of.pdfgive an example of an qualitative variablegive an example of.pdf
give an example of an qualitative variablegive an example of.pdf
ellanorfelicityri239
 
Dynamic biological process influence population density, dispersion a.pdf
Dynamic biological process influence population density, dispersion a.pdfDynamic biological process influence population density, dispersion a.pdf
Dynamic biological process influence population density, dispersion a.pdf
ellanorfelicityri239
 
Discuss some disadvantages of viable counts of microorganisms.So.pdf
Discuss some disadvantages of viable counts of microorganisms.So.pdfDiscuss some disadvantages of viable counts of microorganisms.So.pdf
Discuss some disadvantages of viable counts of microorganisms.So.pdf
ellanorfelicityri239
 
Describe the pathophysiology, clinical manifestations, diagnostic te.pdf
Describe the pathophysiology, clinical manifestations, diagnostic te.pdfDescribe the pathophysiology, clinical manifestations, diagnostic te.pdf
Describe the pathophysiology, clinical manifestations, diagnostic te.pdf
ellanorfelicityri239
 
Could you please do it in R program 1. Assume that we draw n data v.pdf
Could you please do it in R program 1. Assume that we draw n data v.pdfCould you please do it in R program 1. Assume that we draw n data v.pdf
Could you please do it in R program 1. Assume that we draw n data v.pdf
ellanorfelicityri239
 
Class diagrams are used to define the dynamic behavior of an executi.pdf
Class diagrams are used to define the dynamic behavior of an executi.pdfClass diagrams are used to define the dynamic behavior of an executi.pdf
Class diagrams are used to define the dynamic behavior of an executi.pdf
ellanorfelicityri239
 
Can someone please help me with my ICD 10 II assignment...A 47-yea.pdf
Can someone please help me with my ICD 10 II assignment...A 47-yea.pdfCan someone please help me with my ICD 10 II assignment...A 47-yea.pdf
Can someone please help me with my ICD 10 II assignment...A 47-yea.pdf
ellanorfelicityri239
 
CAD is a critical technology for an integrated product development p.pdf
CAD is a critical technology for an integrated product development p.pdfCAD is a critical technology for an integrated product development p.pdf
CAD is a critical technology for an integrated product development p.pdf
ellanorfelicityri239
 
Byzantine influence can be seen in Russian literature because the Ru.pdf
Byzantine influence can be seen in Russian literature because  the Ru.pdfByzantine influence can be seen in Russian literature because  the Ru.pdf
Byzantine influence can be seen in Russian literature because the Ru.pdf
ellanorfelicityri239
 
balance sheet Google Search MC Qu. 122 An example of an operating... .pdf
balance sheet Google Search MC Qu. 122 An example of an operating... .pdfbalance sheet Google Search MC Qu. 122 An example of an operating... .pdf
balance sheet Google Search MC Qu. 122 An example of an operating... .pdf
ellanorfelicityri239
 
Write a 1-2 page essay researching biological science and its famous.pdf
Write a 1-2 page essay researching biological science and its famous.pdfWrite a 1-2 page essay researching biological science and its famous.pdf
Write a 1-2 page essay researching biological science and its famous.pdf
ellanorfelicityri239
 
Why do plants in early stage exhibit high levels of tolerance Early .pdf
Why do plants in early stage exhibit high levels of tolerance Early .pdfWhy do plants in early stage exhibit high levels of tolerance Early .pdf
Why do plants in early stage exhibit high levels of tolerance Early .pdf
ellanorfelicityri239
 
Which researcher(s) paralyzed subjects using Scoline in a classical .pdf
Which researcher(s) paralyzed subjects using Scoline in a classical .pdfWhich researcher(s) paralyzed subjects using Scoline in a classical .pdf
Which researcher(s) paralyzed subjects using Scoline in a classical .pdf
ellanorfelicityri239
 
Which of the following statements is NOT accurate about Mycobacteriu.pdf
Which of the following statements is NOT accurate about Mycobacteriu.pdfWhich of the following statements is NOT accurate about Mycobacteriu.pdf
Which of the following statements is NOT accurate about Mycobacteriu.pdf
ellanorfelicityri239
 
Which of the following is likely to increase the electrical conductiv.pdf
Which of the following is likely to increase the electrical conductiv.pdfWhich of the following is likely to increase the electrical conductiv.pdf
Which of the following is likely to increase the electrical conductiv.pdf
ellanorfelicityri239
 
What is the difference between endogenous and exogenous infections .pdf
What is the difference between endogenous and exogenous infections  .pdfWhat is the difference between endogenous and exogenous infections  .pdf
What is the difference between endogenous and exogenous infections .pdf
ellanorfelicityri239
 
What is a scattergramscatterdotscatterplot (different names for sa.pdf
What is a scattergramscatterdotscatterplot (different names for sa.pdfWhat is a scattergramscatterdotscatterplot (different names for sa.pdf
What is a scattergramscatterdotscatterplot (different names for sa.pdf
ellanorfelicityri239
 

More from ellanorfelicityri239 (20)

How to Read the City Evaluating evidence to generate informed urban .pdf
How to Read the City Evaluating evidence to generate informed urban .pdfHow to Read the City Evaluating evidence to generate informed urban .pdf
How to Read the City Evaluating evidence to generate informed urban .pdf
 
How do transpiration, cohesion and adhesion all work together to pro.pdf
How do transpiration, cohesion and adhesion all work together to pro.pdfHow do transpiration, cohesion and adhesion all work together to pro.pdf
How do transpiration, cohesion and adhesion all work together to pro.pdf
 
How can the Internet be used for competitive advantage in business .pdf
How can the Internet be used for competitive advantage in business .pdfHow can the Internet be used for competitive advantage in business .pdf
How can the Internet be used for competitive advantage in business .pdf
 
give an example of an qualitative variablegive an example of.pdf
give an example of an qualitative variablegive an example of.pdfgive an example of an qualitative variablegive an example of.pdf
give an example of an qualitative variablegive an example of.pdf
 
Dynamic biological process influence population density, dispersion a.pdf
Dynamic biological process influence population density, dispersion a.pdfDynamic biological process influence population density, dispersion a.pdf
Dynamic biological process influence population density, dispersion a.pdf
 
Discuss some disadvantages of viable counts of microorganisms.So.pdf
Discuss some disadvantages of viable counts of microorganisms.So.pdfDiscuss some disadvantages of viable counts of microorganisms.So.pdf
Discuss some disadvantages of viable counts of microorganisms.So.pdf
 
Describe the pathophysiology, clinical manifestations, diagnostic te.pdf
Describe the pathophysiology, clinical manifestations, diagnostic te.pdfDescribe the pathophysiology, clinical manifestations, diagnostic te.pdf
Describe the pathophysiology, clinical manifestations, diagnostic te.pdf
 
Could you please do it in R program 1. Assume that we draw n data v.pdf
Could you please do it in R program 1. Assume that we draw n data v.pdfCould you please do it in R program 1. Assume that we draw n data v.pdf
Could you please do it in R program 1. Assume that we draw n data v.pdf
 
Class diagrams are used to define the dynamic behavior of an executi.pdf
Class diagrams are used to define the dynamic behavior of an executi.pdfClass diagrams are used to define the dynamic behavior of an executi.pdf
Class diagrams are used to define the dynamic behavior of an executi.pdf
 
Can someone please help me with my ICD 10 II assignment...A 47-yea.pdf
Can someone please help me with my ICD 10 II assignment...A 47-yea.pdfCan someone please help me with my ICD 10 II assignment...A 47-yea.pdf
Can someone please help me with my ICD 10 II assignment...A 47-yea.pdf
 
CAD is a critical technology for an integrated product development p.pdf
CAD is a critical technology for an integrated product development p.pdfCAD is a critical technology for an integrated product development p.pdf
CAD is a critical technology for an integrated product development p.pdf
 
Byzantine influence can be seen in Russian literature because the Ru.pdf
Byzantine influence can be seen in Russian literature because  the Ru.pdfByzantine influence can be seen in Russian literature because  the Ru.pdf
Byzantine influence can be seen in Russian literature because the Ru.pdf
 
balance sheet Google Search MC Qu. 122 An example of an operating... .pdf
balance sheet Google Search MC Qu. 122 An example of an operating... .pdfbalance sheet Google Search MC Qu. 122 An example of an operating... .pdf
balance sheet Google Search MC Qu. 122 An example of an operating... .pdf
 
Write a 1-2 page essay researching biological science and its famous.pdf
Write a 1-2 page essay researching biological science and its famous.pdfWrite a 1-2 page essay researching biological science and its famous.pdf
Write a 1-2 page essay researching biological science and its famous.pdf
 
Why do plants in early stage exhibit high levels of tolerance Early .pdf
Why do plants in early stage exhibit high levels of tolerance Early .pdfWhy do plants in early stage exhibit high levels of tolerance Early .pdf
Why do plants in early stage exhibit high levels of tolerance Early .pdf
 
Which researcher(s) paralyzed subjects using Scoline in a classical .pdf
Which researcher(s) paralyzed subjects using Scoline in a classical .pdfWhich researcher(s) paralyzed subjects using Scoline in a classical .pdf
Which researcher(s) paralyzed subjects using Scoline in a classical .pdf
 
Which of the following statements is NOT accurate about Mycobacteriu.pdf
Which of the following statements is NOT accurate about Mycobacteriu.pdfWhich of the following statements is NOT accurate about Mycobacteriu.pdf
Which of the following statements is NOT accurate about Mycobacteriu.pdf
 
Which of the following is likely to increase the electrical conductiv.pdf
Which of the following is likely to increase the electrical conductiv.pdfWhich of the following is likely to increase the electrical conductiv.pdf
Which of the following is likely to increase the electrical conductiv.pdf
 
What is the difference between endogenous and exogenous infections .pdf
What is the difference between endogenous and exogenous infections  .pdfWhat is the difference between endogenous and exogenous infections  .pdf
What is the difference between endogenous and exogenous infections .pdf
 
What is a scattergramscatterdotscatterplot (different names for sa.pdf
What is a scattergramscatterdotscatterplot (different names for sa.pdfWhat is a scattergramscatterdotscatterplot (different names for sa.pdf
What is a scattergramscatterdotscatterplot (different names for sa.pdf
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Identify and discuss the differences between telecommunications prot.pdf

  • 1. Identify and discuss the differences between telecommunications protocols. What are critical elements, how do they operate, what are their vulnerabilities other than cyber based attacks. Solution In a large organization the distinction of telecommunications and networking can vary depending how the organization is structured. I've worked in smaller companies where anything technology related came under the responsibility of the IT (information technology) department. In larger organizations the roles get a bit more defined and separated. For instance, in a large organization someone specializing in telecommunications may have little or no role in understanding computer servers and network operating systems. I am answering this from my very personal perspective. I began working in the 1970s in telecommunications. In the military that meant I installed and repaired radio communications and telephone equipment. In the commercial world I had an FCC (Federal Communications License) which allowed me to work on radio communications equipment. In the 1990s I began working in computer networking, which would be IT (information technology). I see the distinction there as information is data driven. My responsibilities are computer servers and network operating systems. The basic premise of a computer network is to share a resource. The device which allows the resource top be shared is a server. For instance, a print server allows a printer to be shared, a file server allows files to be shared. In my current position my title includes "telecommunications and networking." My telecommunications responsibilities include telephones. Now with IP (internet protocol) based phones, you have the questions of, is it a phone system problem, or a network problem. The separation was a lot "cleaner" as far as responsibilities before IP based phones. My telecommunications responsibilities also include things like the internal network wiring and dealing with the external issues regarding the connectivity to the building. My networking (IT) responsibilities are the maintenance of the computer servers and the network operating systems that allow resources to be shared. In telecommunications terminology, the word protocol is used to address some specified sets of rules and regulations that govern the process of digital information exchange between two distant entities. Further, as telecommunications is a vast field that embodies many communication technologies, multiple protocols work in different areas of digital communication to serve the
  • 2. process of data exchange. Some major areas include PSTN (public switched telephone network) communication protocols, cellular communication protocols, data networking protocols and hybrid communication protocols. PSTN Protocol PSTN protocols (or telephonic communication protocols) are the oldest communication protocols in action, and generally regulate the process of communication between local exchanges, home telephones and gateway exchanges. Some major protocols include SS7 (signaling system 7), SCTP (stream control transmission protocol), V5.1/V5.2 protocols and ISDN (integrated services digital network) protocols. These protocols primarily serve the voice communication procedures within a PSTN. Cellular Communication Protocols Cellular communication employs transmitting data towards mobile data units roaming within the coverage area. This communication procedure is a prevalent method of data communications, and it has many different specially designed protocols for its data exchanging and transmission controlling procedures. Some common cellular communication protocols include BSMAP (base station management application part), BSSMAP (base station subsystem management application part), BSSAP (base station subsystem application part), DTAP (direct transfer application part), SMSTP (short message service transfer layer protocol), BTSM (base transceiver station management) and MAP (mobile application part). Data Communication Protocols The domain of data communication includes all the local, private and public networks that employ computers for exchanging data among users. Some examples of these are local area networks, metropolitan area networks, wide area networks and the network of networks -- the Internet. These networks use various sets of communication protocols to regulate and control the process of data communication, and some major ones include TCP (transmission control protocol), IP (Internet protocol), FTP (file transport protocol), HTTP (hyper-text transfer protocol), POP (post office protocol), SMTP (simple mail transfer protocol), DHCP (dynamic host control protocol), BGP (border gateway protocol), UDP (unified datagram protocol), RTP (real time protocol) and RSVP (reservation control protocol). VoIP Protocols VoIP (Voice over Internet Protocol) is a communication technology that provides solutions of transferring voice, multimedia, and text-based data simultaneously over a single carrier. This technology is developed by amalgamating data networks and PSTN, and for this reason, it uses many protocols from both mentioned categories of telecommunication systems. It has some specific protocols developed for its core operations as well, which mainly include MGCP (media gateway control protocol), SIP (session initiation protocol), H.323, H.248, SDP (session
  • 3. description protocol), SAP (session announcement protocol), MIME (multipurpose Internet mail extensions) and SGCP (signaling gateway control protocol). In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice generally refers to software vulnerabilities in computing systems. A security risk may be classified as a vulnerability. The use of vulnerability with the same meaning of risk can lead to confusion. The risk is tied to the potential of a significant loss. Then there are vulnerabilities without risk: for example when the affected asset has no value. A vulnerability with one or more known instances of working and fully implemented attacks is classified as an exploitable vulnerability — a vulnerability for which an exploit exists. The window of vulnerability is the time from when the security hole was introduced or manifested in deployed software, to when access was removed, a security fix was available/deployed, or the attacker was disabled—see zero-day attack. Security bug (security defect) is a narrower concept: there are vulnerabilities that are not related to software: hardware, site, personnel vulnerabilities are examples of vulnerabilities that are not software security bugs.