Pages

Sunday 25 June 2023

List of Abbreviations and Acronyms

 

3GPP 3G Partnership Project Protocols

6LoWPAN IPv6 over Low power Wireless Personal Area Networks

ACID Atomicity, Consistency, Isolation and Durability of transactions

ADAS Advance Driver Assistance Systems

ADC Analog-to-Digital Converter

ADFG Acrylic Data Flow Graph

ADSL Asymmetric Digital Subscriber Line

AES Advanced Encryption 128- or 192- or 256- bit key length Algorithm

AES-CCM AES with CCM

API Application Programming Interface 

AQI Air Quality Index

ARP Address Resolution Protocol

ASCII American Standard Code for Information Interchange

ASIC Application Specific Integrated Circuit

ATM Automated Teller Machine 

AWS Amazon Web Services

BB BeagleBone

BI Business Intelligence

BJT Bipolar Junction Transistor

xx List of Abbreviations and Acronyms

Bootpc Bootstrap Protocol Client

Bootps Bootstrap Protocol Server

BP Business Process

BT BR Bluetooth Basic data rate in 1.0, 2.0, 3.0 or 4.0 device

BT EDR Bluetooth Enhanced Data Rate

BT LE Bluetooth Low Energy

CA Certification Authority

CAN Controller Area Network bus

CAP Consistency, Availability and Partitions

CBC Cryptographic Block Cipher for block ciphers with a block length of 

128 bits

CCD Charge Coupled Device 

CCM Counter with CBC-MAC

CEP Complex Event Processing

CGA Cryptographically Generated Addresses 

CIDR Classless Inter-Domain Routing 

CIMD Computer Interface to Message Distribution

CoAP Constrained Application Protocol

CORE Constrained RESTful Environment

CRC Cyclic Redundancy Check

CRM Customer Relations Management

CSMA/CD Carrier Sense Multiple Access with Collision Detection

CUP Connected Universe Platform

CVS Concurrent Versions System

CWI Cloud Web Interface

DAG Directed Acrylic Graph

DB Database

DBMS Database Management System

DBP Distributed Business Process

DFG Data Flow Graph

DHCP Dynamic Host Control Protocol 

DLL Dynamically Linked Library

DM Device Management

DNS Domain Name System

DODAG Destination Oriented Directed Acrylic Graph

List of Abbreviations and Acronyms xxi

DoS Denial-of-Service

DSL Digital Subscriber Line

DSP Digital Signal Processor

DSSS Direct Sequence Spread Spectrum 

DTLS Datagram Transport Layer Security

DWI Device Web Interface

ECU Electronic Control Unit

EPC Electronic Product Code

ESP Event Stream Processing

ETL Extract, Transform and Load 

FC Functional Component 

FG Functional Group

FHSS Frequency Hopping Spread Spectrum 

FOTA Firmware Over-The-Air

FPT Phototransistor

FTP File Transfer Protocol

GPIO General Purpose Input-Output

GPRS General Packet Radio Service

GSM Global System for Mobiles

HAB Home Automation Bus

HAN Home Area Network

HDFS Hadoop File System

HLR Home Location Register 

HSPA High Speed Packet Access

HTML HyperText Markup Language

HTTP Hypertext Transfer Protocol

HTTPS HTTP over TLS/SSL

I/O Input-Output

I2C Inter-Integrated Circuit 

IaaS Infrastructure-as-a-Service

IANA Internet Assigned Number Authority 

ICCM Internet Connected Car Maintenance 

ICMP Internet Control Message Protocol

ICSP In-Circuit Serial Programming 

xxii List of Abbreviations and Acronyms

ICT Information and Communications Technology

IDE Integrated Development Environment

IdM Identity Management

IEC International Electrotechnical Commission for Standards

IETF Internet Engineering Task Force

IFTTT If This Then That service

IIC Industrial Internet Consortium 

IIoT Industrial IoT

IM Instant Messaging

IO Input-Output

IoT Internet of Things

IP Internet Protocol

IPSec IP Security Protocol

IPSP Internet Protocol Support Profile 

IPv4 Internet Protocol version 4

IPv6 Internet Protocol version 6 

iq Information/Query

IR-LED Infrared Light Emitting Diode

ISDN Integrated Services Data Network 

ISM Industrial, Scientific and Medical

ISO International Organization for Standardization

JAR Java Archive

JID Jabber ID 

JMS Java Message Service

JSON Java Script Object Notation

KPI Key Performance Indicators

LAN Local Area Network (of Computers)

LED Light Emitting Diode

LIDAR Light + Radar, also Laser Imaging, Detection and Ranging

LIN Local Interconnect Network Bus

LLN Low Power Lossy Networks

LoRaWAN Low-power and Range WAN

LPWAN Low-power WAN

LTE Long Term Evolution

List of Abbreviations and Acronyms xxiii

LWM2M Lightweight M2M Protocol

LWT Last Will and Testament on failure of a session, for example, between 

a client and broker or server

M2M Machine-to-Machine

MAC Media Access Control 

mDNS Multicast Domain Name System

MEMS Micro-Electro-Mechanical Sensor 

MFLOPS Million Floating Point Operations Per Second 

MIME Multipurpose Internet Mail Extension

MINA Multi-Hop Infrastructure Network Architecture 

MIPS Million Instructions Per Second 

MMC Multimedia Card

MO Mobile Origin 

MOSFET Metal-oxide Field Effect Transistor

MOST Media Oriented System Transport

Mote Mobile Terminal

MPLS Multiprotocol Label Switching

MPP Massively Parallel Processing

MQ Message Queue

MQTT Message Queue Telemetry Transport protocol

MS Mobile Station

MSISDN Mobile Station ISDN Number

MT Mobile Terminal 

MTC Machine Type Communication

MTU Maximum Transmission Unit 

MUT Multi-User Chat

NAN Neighbourhood Area Network

ND Neighbour Discovery

NDP Network Discovery Protocol 

NFC Near Field Communication

NFV Network Function Virtualization

NIST National Institute of Standards and Technology

OASIS Organization for the Advancement of Structured Information 

Standards

ODBC Open Database Connectivity

xxiv List of Abbreviations and Acronyms

OID Object Identifier

OLAP On-Line Analytical Processing 

OLTP On-Line Transactions Processing 

OMA Open Mobile Alliance

ONS Object Name Service

ORCHID Overlay Routable Cryptographic Hash Identifier

OS Operating System

OSGi Open Services Gateway initiative

OWASP Open Web Application Security Project

P2P Point-to-Point 

PaaS platform-as-a-service

PAN Personal Area Network

PCI Peripheral Component Interconnect

PCMCIA Personal Computer Memory Card International Association

PDU Protocol Data Unit for a layer

PII Personally Identifiable Information 

PKI Public Key Infrastructure

PPP Point-to-Point Protocol 

PS Participatory Sensing

PSK Pre-Shared Key

pubsub Publication by a service and subscription by end point or client or 

server

PWM Pulse Width Modulator

QoS Quality of Service

QR code Quick Response code

RAM Random Access Memory 

RARP Reverse Address Resolution Protocol

RDMS Relational Database Management System

REST Representational State Transfer

RF Radio Frequency of MHz

RFC IETF Request for Comments standardisation document

RFD Reduced Function Device

RFIC RF Integrated Circuits

RFID Radio Frequency Identification

ROLL Routes Over the Low power and Lossy network

List of Abbreviations and Acronyms xxv

ROM Read Only Memory 

RPC Remote Procedure Call

RPi Raspberry Pi 

RPK Random Pair-wise Keys, Raw-Public-key

RPL IPv6 Routing Protocol for LLNs (Low Power Lossy Networks)

RPM Revolution per Minute

RPMP Re-Planning Manufacturing Process

RTC Real Time Clock

RTOS Real Time Operating System

Rx Receiver

RxD Receiver Data line

SaaS Software as a Service

SASL Simple Authentication and Security Layer

SCADA Supervisory Control and Data Acquisition 

SCL Serial Clock

SCOVARS Supply Chain Order Verification, Automated Reordering and 

Shipping

SD Service Discovery 

SDA Serial Data

SDK Software Development Kit

SHA Secure Hash Algorithm

SIM Subscriber Identity Module (generally a card) in mobile

SLA Service Level Agreement

SMPP Short Message Peer to Peer

SMS Short Message Service 

SNMP Simple Network Management Protocol 

SOAP Simple Object Access Protocol

SPI Serial Peripheral Interface Bus

SPINS Security Protocols in Network of Sensors

SQL Structured Query Language

SS7 Signaling Service Protocol 

SSID Service Set Identifier

SSL Secure Scoket Layer

STP Spanning Tree Protocol 

SWE Sensor Web Enablement services

xxvi List of Abbreviations and Acronyms

TCCICDD Tracking of Customer Carrying Internet Connected Digital Devices

TCP Transmission Control Protocol

TCUP TCS Connected Universe Platform

TFTP Trivial File Transfer Protocol

TLS Transport Layer Security

TLS Transport Layer Security

TLV Tag Length Value

TSDB Time Series Database 

TTP Trusted Third Party 

Tx Transmitter

TxD Transmitter Data line

UART Universal Asynchronous Receiver and Transmitter

UCP/UMI Universal Computer Interface Protocol/Machine Interface

UDP User Datagram Protocol

UI User Interface

UPC Universal Product Code

URI Universal Resource Identifier

URL Universal Resource Locator

USB Universal Serial Bus

V2I Vehicle to Infrastructure Communication 

VLAN Virtual Local Area Network 

W3C World Wide Web Consortium

WAN Wide Area Network

WEP Wired Equivalent Privacy 

WIDL Web Interface Definition Language

Wi-Fi Wireless Fidelity 

WLAN Wireless 802.11 Local Area Network

WPA Wireless Protected Access

WSAPI WebSocket Application Programming Interface

WSN Wireless Sensor Node/Network

WWAN Wireless Wide Area Network

XAAS Everything-as-a-Service 

xep XMPP Extension Protocol

XHTML EXtensible HyperText Markup Language

List of Abbreviations and Acronyms xxvii

XML EXtensible Markup Language

XMPP EXtensible Messaging and Presence Protocol

XMPP-IoT XMPP xeps for the IoT/M2M 

XSF XMPP Standards Foundation


Saturday 26 November 2022

ACN short questions : HTPS vs FTP vs SMTP , IPV6

 Differences : HTPS vs FTP vs SMTP

 
List of features of IPv4:

Address Structure:
An IPv6 address is made of 128 bits divided into eight 16-bits blocks. Each block is then converted into 4-digit Hexadecimal numbers separated by colon symbols.

For example, given below is a 128 bit IPv6 address represented in binary format and divided into eight 16-bits blocks:

0010000000000001 0000000000000000 0011001000111000 1101111111100001 0000000001100011 0000000000000000 0000000000000000         1111111011111011
Each block is then converted into Hexadecimal and separated by ‘:’ symbol:
2001:0000:3238:DFE1:0063:0000:0000:FEFB

1. Larger Address Space
The IPV6 uses four times more bits for addressing a device on the internet as compared to IPV4, and the space provided by it is 3.4 x 10 ^ 38 devices; the address space provided by IPV6 may fulfill the requirement to allocate addresses all over the world means it can be allocated to everywhere on the earth in a square meter, this the main feature of the IPV6.

2. Simplified Header
The header of the IPV6 is twice bigger than the header provided by IPV4 on the other hand, the address provided by it is 4× more than IPV4, IPV6 header is not complex but easy to process while in IPV4, the header is complex, so by simplifying in IPV6 we need to move all the information from the header of it to the end of its header.

3. End-to-end Connectivity
The end-to-end connectivity feature in internet protocol, as of now every system has an IP address which is to be unique it can cross the internet without translating other components, it is fully implemented on the internet each host can access the other host directly, but there may have some restrictions like firewall, and policies of the organization may restrict.

4. Auto-configuration
The auto-configuration is the process to verify uniqueness on a link; it also determines the information that should be auto-configured, it supports stateful configuration mode to keep track of each assignment as well as it also supports the stateless auto-configuration in which there is no need to configure manually because it automatically generates the IPV6 addresses.

5. Faster Routing or Forwarding
The information which is present at the first part of the header is enough to make routing decisions as we know this is the simplified header feature as we have seen above, and due to the information present at header the IPV6 can make routing decisions faster, in this, we can say that IPV6 is faster in routing.

6. IPSec
This is an optional feature provided by IPV6 to give security of IPSec type, which is more secure than IPV4 and IPSec is used at the network or packet processing layer to secure the network.

7. Aggregation
The aggregation is another feature of IPV6, which allows using a single prefix for the entire network, which is easy and flexible to promote efficient and scalable routing.

8. No Broadcast
The IPV6 uses multicast address instead of broadcast address because it does not support the broadcast address, by using multicast address it communicates with the multiple hosts, it also has anycast mode which is a new type of address, a network device sends a packet to a multicast address then the device broadcast the packet to all interfaces which are identified by the address.

9. Anycast Support
Anycast is the featuring provided by IPV6 that is the mode of packet routing; on the internet, by using the anycast mode, the same anycast IP address can assign multiple interfaces, we can say that this is the address we can assign to multiple interfaces or set of interfaces, in this way IPV6 support the anycast.

10. Mobility
This feature of IPV6 allows the host, like a mobile phone, to keep the device connected in different geographic areas by using the same IP address, the mobility in IPV6 can assign an IP address to the mobile node within its home network, and the mobile node of the home address is useful to reach their destination.

11. Enhanced Priority Support
This is another feature of the IPV6 to check the priority support that IPV4 provided the quality of services where it used 6 bits Differential Service Code Point that is DSCP, and 2 bits Explicit Congestion Notification that is ECN but that can be used only when there is an end-to-end devices support so the underlying network like source and destination may support to it.

12. Smooth Transition
The smooth transition is the transition technique in IPV6 which is upgraded from IPV4 based on the up-to-date IPV6 technique, by the feature of the large IP address in IPV6 allow to assign the same IP address globally so devices can send and receive data within the network, the router in it can forward the decisions quickly rather the header is less loaded, and another enhancement is that all routers in one path need to do recalculation for IPV6 packet instead of error detection which is handled by the data link layer.

13. Extensibility
Extensibility is the major advantage of the IPV6; it is extensible so that it can add more information in the options section, the IPV6 has a large size packet where the IPV4 has less than IPV6 so that IPV4 can support 40-byte options only, in this way of adding extension header after the IPV6 header IPV6 can easily be extended, and the size of its extension is mannered by the size of its packets.

Local & Global address:

Global Addressing: A source or a destination needs to have a global address-an address that can be unique in the scope of the network or internationally.

Local Addressing: The identifier that is actually used for data transfer is called the virtual-circuit identifier (VCI). A VCI, unlike a global address, is a small number that has only switch scope; it is used by a frame between two switches. When a frame arrives at a switch, it has a VCI; when it leaves, it has a different VCI.

Difference between Switch and Router:
RouterSwitch
The main objective of router is to connect various networks simultaneously.While the main objective of switch is to connect various devices simultaneously.
It works in network layer.While it works in data link layer.
Router is used by LAN as well as MAN.While switch is used by only LAN.
Through the router, data is sent in the form of packets.While through switch data is sent in the form of  frame.
There is less collision taking place in the router.While there is no collision taking place in full duplex switch.
Router is compatible with NAT.While it is not compatible with NAT.
The types of routing are: Adaptive and Non-adaptive routing.The types of switching are: Circuit, Packet,and Message Switching.

Wednesday 14 September 2022

ACN-2

 Open System Interconnection:

OSI stands for Open Systems Interconnection

Created by International Standards Organization (ISO)

Was created as a framework and reference model to explain how different networking technologies work together and interact

It is not a standard that networking protocols must follow

Each layer has specific functions it is responsible for

All layers work together in the correct order to move data around a network

Application Layer

Contains all services or protocols needed by application software or operating system to communicate on the network
Examples
o –Firefox web browser uses HTTP (Hyper-Text Transport Protocol)
o –E-mail program may use POP3 (Post Office Protocol version 3) to read e-mails and SMTP (Simple Mail Transport Protocol) to send e-mails

Presentation Layer

Concerned with how data is presented to the network

Handles three primary tasks: 

 Translation , Compression , Encryption

Session Layer

Responsible for managing the dialog between networked devices

Establishes, manages, and terminates connections

Provides duplex, half-duplex, or simplex communications between devices

Provides procedures for establishing checkpoints,  adjournment,  termination, and restart or recovery procedures

Transport Layer

Takes data from higher levels of OSI Model and breaks it into segments that can be sent to lower-level layers for data transmission

Conversely, reassembles data segments into data that higher-level protocols and applications can use

Also puts segments in correct order (called sequencing ) so they can be reassembled in correct order at destination

Concerned with the reliability of the transport of sent data

May use a connection-oriented protocol such as TCP to ensure destination received segments

May use a connectionless protocol such as UDP to send segments without assurance of delivery

Uses port addressing

Network Layer 

Responsible for moving packets (data) from one end of the network to the other, called end-to-end communications

Requires logical addresses such as IP addresses

Device example: Router

Routing is the ability of various network devices and their related software to move data packets from source to destination

Data Link Layer

Is responsible for moving frames from node to node or computer to computer

Can move frames from one adjacent computer to another, cannot move frames across routers

Encapsulation = frame

Requires MAC address or physical address

Protocols defined include Ethernet Protocol and Point-to-Point Protocol (PPP)

Device example: Switch

Two sublayers: Logical Link Control (LLC) and the Media Access Control (MAC)

o Logical Link Control (LLC)

–Data Link layer addressing, flow control, address notification, error control

o Media Access Control (MAC)

–Determines which computer has access to the network media at any given time

–Determines where one frame ends and the next one starts, called frame

synchronization

Physical Layer

Deals with all aspects of physically moving data from one computer to the next

Converts data from the upper layers into 1s and 0s for transmission over media

Defines how data is encoded onto the media to transmit the data

Defined on this layer: Cable standards, wireless standards, and fiber optic standards.

Copper wiring, fiber optic cable, radio frequencies, anything that can be used to transmit data is defined on the Physical layer of the OSI Model

Device example: Hub

Used to transmit data

An exchange using the OSI model



TCP/IP Model (Transmission Control Protocol/Internet Protocol)
A protocol suite is a large number of related protocols that work together to allow networked computers to communicate
Application Layer
Application layer protocols define the rules when implementing specific network applications
Rely on the underlying layers to provide accurate and efficient data delivery
Typical protocols:
o FTP – File Transfer Protocol
For file transfer
o Telnet – Remote terminal protocol
For remote login on any other computer on the network
o SMTP – Simple Mail Transfer Protocol
For mail transfer
o HTTP – Hypertext Transfer Protocol
For Web browsing
Encompasses same functions as these OSI Model layers Application Presentation Session

Transport Layer 
TCP is a connection-oriented protocol
o Does not mean it has a physical connection between sender and receiver
o TCP provides the function to allow a connection virtually exists – also called virtual circuit
UDP provides the functions:
o Dividing a chunk of data into segments
o Reassembly segments into the original chunk
o Provide further the functions such as reordering and data resend
Offering a reliable byte-stream delivery service
Functions the same as the Transport layer in OSI
Synchronize source and destination computers to set up the session between the respective computers

Internet Layer
The network layer, also called the internet layer, deals with packets and connects independent networks to transport the packets across network boundaries. The network layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is used for error reporting.

Host-to-network layer
The Host-to-network layer is the lowest layer of the TCP/IP reference model. It  combines  the  link layer and  the  physical layer of  the  ISO/OSI  model.  At this layer, data is transferred between adjacent network nodes in a WAN or between nodes on the same LAN.

OSI Model Vs TCP/IP Model:



ACN-1

A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network.

“Computer network’’ means a collection of autonomous computers interconnected by a single technology. Two computers are said to be interconnected if they are able to exchange information.

The connection need not be via a copper wire; fiber optics, microwaves, infrared, and communication satellites can also be used, with  the Internet being the most well-known example of a network of networks.

There is considerable confusion in the literature between a computer network and a distributed system. The key distinction is that in a distributed system, a collection of independent computers appears to its users as a single coherent system. Usually, it has a single model or paradigm that it presents to the users. Often a layer of software on top of the operating system, called middleware, is responsible for implementing  this  model.  A  well-known example of a distributed system is the World Wide Web. It runs on top of the Internet and presents a model in which everything looks like a document (Web page).

USES OF COMPUTER NETWORKS

1. Business Applications

To distribute information throughout the company (resource sharing). sharing physical resources such as printers, and tape backup systems, is sharing information

client-server model. It is widely used and forms the basis of much network usage.

communication medium among employees. email (electronic mail), which employees generally use for a great deal of daily communication.

Telephone calls between employees may be carried by the computer network instead of by the phone company. This technology is called IP telephony or Voice over IP (VoIP) when Internet technology is used.

Desktop sharing lets remote workers see and interact with a graphical computer screen

Doing business electronically, especially with customers and suppliers. This new model is called e-commerce (electronic commerce) and it has grown rapidly in recent years.

2.Home Applications

peer-to-peer communication

person-to-person communication

electronic commerce

entertainment.(game playing,)

3.Mobile Users

Text messaging or texting

Smart phones,

GPS (Global Positioning System)

m-commerce

NFC (Near Field Communication)

4.Social Issues

With the good comes the bad, as this new-found freedom brings with it many unsolved social, political, and ethical issues. 

Social networks, message boards, content sharing sites, and a  host  of other applications allow people to share their views with  like-minded individuals. As long as the subjects are restricted to technical topics or hobbies like gardening, not too many problems will arise.

The trouble comes with topics that people actually care about, like politics, religion, or sex. Views that are publicly posted may be deeply offensive to some people. Worse yet, they may not be politically correct. Furthermore, opinions need not be limited to text; high-resolution color photographs and video clips are easily shared over computer networks. Some people take a live-and-let-live view, but others feel that posting certain material (e.g., verbal attacks on particular countries or religions, pornography, etc.) is simply unacceptable and that such content must be censored. Different countries have different and conflicting laws in this area. Thus, the debate rages.

Computer networks make it very easy to communicate. They also make it easy for the people who run the network to snoop on the traffic. This sets up conflicts  over  issues  such  as  employee  rights  versus  employer   rights. Many people read and write email at work. Many employers have claimed the right to read and possibly censor employee messages, including messages sent from a home computer outside working hours. Not all employees agree with this, especially the latter part.

Another conflict is centered around government versus citizen’s rights.A new twist with mobile devices is location privacy. As part of the process of providing service to your mobile device the network operators learn where you are at different times of day. This allows them to track your movements. They may know which nightclub you frequent and which medical center you visit.

Phishing ATTACK: Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

BOTNET ATTACK: Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.

Data Communications System :

The effectiveness of a data communications system depends on  four fundamental characteristics: delivery, accuracy, timeliness, and jitter.

I. Delivery. The system must deliver data to the correct destination. Data must be received by the intended device or user and only by that device or user.

2 Accuracy. The system must deliver the data accurately. Data that have been altered in transmission and left uncorrected are unusable.

3.Timeliness. The system must deliver data in a timely  manner.  Data delivered late are useless. In the case of video and audio, timely delivery means delivering data as they are produced, in the same order that they are produced, and without significant delay. This kind of delivery is called real-time transmission.

4.Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of audio or video packets. For example, let us assume that video packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an uneven quality in the video is the result.

A data communications system has five components

1.Message. The message is the information (data) to be communicated. Popular forms of information include text, numbers, pictures, audio, and video. 

2 Sender. The sender is the device that sends the data message. It can be a computer, workstation, telephone handset, video camera, and so on.

3.Receiver. The receiver is the device that receives the message. It can be a computer, workstation, telephone handset, television, and so on.

4.Transmission medium. The transmission medium is the physical path by which a message travels from sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.

5.Protocol. A protocol is a set of rules that govern data communications. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating, just as a person speaking French cannot be understood by a person who speaks only Japanese.

Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex as shown in Figure.
Simplex 
In simplex mode, the communication is unidirectional, as on a one- way street. Only one of the two devices on a link can transmit; the other can only receive (Figure a). Keyboards and traditional monitors are examples of simplex devices.

Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice versa (Figure b). Walkie-talkies and CB (citizens band) radios are both half- duplex systems.

Full-Duplex
In full-duplex, both stations can transmit and receive simultaneously (Figure c). One common example of full-duplex communication is the telephone network. When two people are communicating by a telephone line, both can talk and listen at the same time. The full-duplex mode is used when communication in both directions is required all the time.

Tuesday 16 August 2022

Installation of contiki 3.0 on ubuntu20.04

root@ubuntu:/home/ubuntu$ sudo -s

root@ubuntu:/home/ubuntu# 

root@ubuntu:/home/ubuntu#  wget https://github.com/contiki-os/contiki/archive/3.0.zip

root@ubuntu:/home/ubuntu#  unzip 3.0.zip


List of Abbreviations and Acronyms

  3GPP 3G Partnership Project Protocols 6LoWPAN IPv6 over Low power Wireless Personal Area Networks ACID Atomicity, Consistency, Isolation ...