NetSec Batch 11
This blog is used for educational purpose only .....
Tuesday, 4 June 2013
Friday, 1 July 2011
Thursday, 30 June 2011
Flashback : Understanding the Internet Reference Model
Network Access Layer
The lowest layer. Contains protocols that the computer uses to deliver data to the others computer and devices that are attached to the network. The protocols at this layer perform three distinct function:
Responsible for routing messages through internetwork
Two types of device are responsible:
Responsible for providing end-to-end data integrity and provides a high reliable communication service for entities that want to carry out an extended two way conversation.
Application Layer
The top layer. Provide functions for users or their programs and it is highly specific to the application being perform. It provides the service that user applications use to communicate over the network. It is the layer in which user-access network processes reside.
The layer includes all applications protocols that use the host-to-host transport protocols to deliver data. Others function that process user data such as data encryption and decryption, compression and decompression
The application layer also manages the sessions (connections ) between cooperating applications. TCP/IP uses the term "socket" and "port " to describe the path ("virtual circuit") over which cooperating applications communicate.
For cooperating applications to be able exchange data, they must agree about how data is represented. The application layer is responsible for standardizing the presentation of data.
The lowest layer. Contains protocols that the computer uses to deliver data to the others computer and devices that are attached to the network. The protocols at this layer perform three distinct function:
- Define how to use the network to transmit a frame, which is the data unit passed across the physical connection
- Exchange data between computer and physical network
- Deliver data between two devices on the same network. To deliver data on the local network, the network access layer use the physical address of the nodes on the network.
Responsible for routing messages through internetwork
Two types of device are responsible:
- Gateway - Computer that has two network adapter card. This computer accepts network packet from one network on one network card and routes those packet to a different network via the second network adapter card.
- Router - A dedicated hardware device that passes packets from one network to a different network.
Responsible for providing end-to-end data integrity and provides a high reliable communication service for entities that want to carry out an extended two way conversation.
Application Layer
The top layer. Provide functions for users or their programs and it is highly specific to the application being perform. It provides the service that user applications use to communicate over the network. It is the layer in which user-access network processes reside.
The layer includes all applications protocols that use the host-to-host transport protocols to deliver data. Others function that process user data such as data encryption and decryption, compression and decompression
The application layer also manages the sessions (connections ) between cooperating applications. TCP/IP uses the term "socket" and "port " to describe the path ("virtual circuit") over which cooperating applications communicate.
For cooperating applications to be able exchange data, they must agree about how data is represented. The application layer is responsible for standardizing the presentation of data.
Flashback : TCP/IP
Generally , TCP/IP is described using three to five functional layers.
At the remote end, the data is passed up the stack to the receiving application
Each layer in the stack adds control information (such as destination address, routing control and checksum) to ensure proper delivery.
The control information is called header and/or trailer because it is placed in front of or behind the data to be transmitted. Each layer treats all of the information that it receives from layer above it as data, and it places its own header and/or trailer.
When data is received, the opposite happen, each layer strips off its header and/or trailer before passing the data up to the layer above.
This model is based on the three layer. These three layers are as follows:
- Network access layer
- Host-to-host transport layer
- Application layer
How a Protocol Stack Work
Data is passed down the stack from one layer to the next, until it is transmitted over the network by network access layer protocolsAt the remote end, the data is passed up the stack to the receiving application
Each layer in the stack adds control information (such as destination address, routing control and checksum) to ensure proper delivery.
The control information is called header and/or trailer because it is placed in front of or behind the data to be transmitted. Each layer treats all of the information that it receives from layer above it as data, and it places its own header and/or trailer.
When data is received, the opposite happen, each layer strips off its header and/or trailer before passing the data up to the layer above.
Wednesday, 29 June 2011
Sunday, 26 June 2011
Friday, 24 June 2011
IP Address Table
2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 |
/17 | /18 | /19 | /20 | /21 | /22 | /23 | /24 |
128 | 192 | 224 | 240 | 248 | 252 | 254 | 255 |
128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 |
/25 | /26 | /27 | /28 | /29 | /30 | /31 | /32 |
128 | 192 | 224 | 240 | 248 | 252 | 254 | 255 |
128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
Subscribe to:
Posts (Atom)