Sunteți pe pagina 1din 4

Difference between DSL &ADSL

DSL ADSL

Stands For: Stands For:


1. Digital Subscriber Loop/line 1. Digital Subscriber Line/loop

2. It is Super set of ADSL,SDSL e.t.c 2. ADSL is a subset of DSL ,

3. Same upload and Download 3. Low upload and High Download


Speed Speed

4. Speed Change by Distance 4. Speed Change by time to time

5. DSL is a service, which offers a 5. It is a broadband connection


faster Internet connection than a technology that enables the
standard dial-up connection. computers to connect to each
other overInternet.
6. DSL is a technology for bringing 6. ADSL transmit data over copper
high- bandwidth information to telephone line
homes and small businesses over
ordinary copper telephone lines.

Transport layer Security (TLS)


Transport Layer Security (TLS) is a protocol that provides privacy and data integrity
between two communicating applications. It's the most widely deployed security protocol
used today, and is used for Web browsers and other applications that require data to be
securely exchanged over a network, such as file transfers, VPN connections, instant
messaging and voice over IP.

According to the protocol specification, TLS is composed of two layers: the TLS Record Protocol
and the TLS Handshake Protocol. The Record Protocol provides connection security, while the
Handshake Protocol allows the server and client to authenticate each other and to negotiate
encryption algorithms and cryptographic keys before any data is exchanged.
Although TLS is not vulnerable to the POODLE attack, because it specifies that all padding
bytes must have the same value and be verified, a variant of the attack has exploited certain
implementations of the TLS protocol that don't correctly validate encryption padding. This
makes some systems vulnerable to POODLE, even if they disable SSL -- one of the
recommended techniques for countering a POODLE attack.

The IETF's Using TLS in Applications (UTA) working group plans to offer commonguidelines and
best practices for using TLS in applications, such as the use of the latestcryptographic
algorithms and eliminating the use of older TLS/SSL versions, as well asguidance on how certain
applications should use the encryption protocol. TLS 1.3 is still adraft and has not been finalized
yet, but having an updated protocol that's faster, moresecure and easier to implement is
essential to ensure the privacy and security ofinformation exchange and maintain trust in the
Internet as a whole.

Code Division Multiplexing (CDM)


Definition:
Code division multiplexing (CDM) is a networking technique in which multiple data signals
are combined for simultaneous transmission over a common frequency band.
When CDM is used to allow multiple users to share a single communications channel, the
technology is called code division multiple access (CDMA).

Origin:
CDMA uses spread spectrum, a technology that was developed in World War II to prevent
enemies from intercepting and jamming transmissions. In spread spectrum, a data signal is
sent over a range of frequencies in an assigned frequency spectrum.
A pseudo-random spreading code is used to multiplex the base signal. Multiplexing with a
spreading code increases the bandwidth required for the signal, spreading it out over the
available spectrum. The receiving device is aware of the spreading code and uses it to
demultiplex the signal.
CDMA provides a certain amount of built-in security, as the transmissions of multiple users
are mixed together within the frequency spectrum. The spreading code is required to decode
a specific transmission.

Application:
Different variations of CDM and CDMA are used in 2G and subsequent generations of
cellphone technology.
Working:
 CDM does not rely on physical properties(such as frequency or time)

 CDM relies on an interesting mathematical ideavalues from orthogonal vector spaces


can be combined and separated without interference

 Each sender is assigned a unique binary code Ci that is known as a chip sequence. chip
sequences are selected to be orthogonal vectors (i.e., the dot product of any two chip
sequences is zero)

 At any point in time, each sender has a value to transmit, Vi. The senders each multiply
Ci x Vi and transmit the results

 The senders transmit at the same timeand the values are added together

 To extract value Vi, a receiver multiplies the sum by Ci

 Consider an example

– to keep the example easy to understand, use a chip sequence that is only two
bits long and data values that are four bits long

– think of the chip sequence as a vector

• Figure 11.15 lists the values


• The first step consists of converting the binary values into vectors that use -1 to
represent 0:

• If we think of the resulting values as a sequence of signal strengths to be transmitted at


the same time

– the resulting signal will be the sum of the two signals


A receiver treats the sequence as a vector

– computes the product of the vector and the chip sequence

– treats the result as a sequence, and converts the result to binary by interpreting
positive values as binary 1 and negative values as 0

• Thus, receiver number 1 computes:

C1

• Interpreting the result as a sequence produces: (2 -2 2 -2)

– which becomes the binary value: (1 0 1 0)

– note that 1010 is the correct value of V1

– receiver 2 will extract V2 from the same transmission

S-ar putea să vă placă și