Test

http://www.dailymotion.com/video/x19q5gn_aj-kamran-khaAj Kamran Khan Ke Sathn-ke-sath-15th-jan-2015_news

Belkin Wireless Router

Belkin F5D7234-4 G Wireless Router 54 mbps



This type of network devices is perfect for the simple wireless network that has the speed for handling basic networking applications such as sharing an internet network connection between multiple computers, emailing and massaging.
It has the fast Ethernet ports for cable networking

ASUS Wi-Fi DSL-N12U

Wireless-N300 ADSL Modem Router


This ASUS wireless router device has dual functionality, modem and router. This is easy to install and 3 simple steps configuring your ADSL ISP settings. On this type of net device you can share printers. 4 multiple SSIDs and 5 dbi powerful antenna for external.

Huawei D100 3G Wi-Fi

Huawei D100 Router transforms 3G dongle into WiFi network

This device transforms the standard 3G dongle into a full-on WiFi network, without all of the hassle and fees of a traditional network. It is very simple and easy to use. You can made it 3G dongle wi-fi broad band router. you use internet at any time on any where.With this device you can share your network with your friends and other family members in your home

Application layer

Application layer

The application layer enables the user, whether human or software, to access the network. Application layer provides user interfaces and support for services such as electronic mail. Remote file access and transfer, share database management and other types of distributed information services. Specific services provided by the application layer include the following:
Ø  Network virtual terminal. A network virtual terminal is a software version of physical terminal and allow user to log on to a remote host. To do the application creates a software emulation of a terminal at the remote host. The user's computer talk to the software terminal, which in turn  talks to the host, vice versa. The remote host believes it is communicating with one of its own terminals and allows you to log on.
Ø  File transfer, access and management (FTAM). This application allows a user to access files in remote host (to make change or read data), to retrieve files form a remote computer for use in the local computer, and to manage or control files in a remote computer locally.
Ø  E-mail services. This application provides the basis for e-mail forwarding and storage.
Ø  Directory services. The application provides distributed database sources and access for global information about various objects and services. 

Presentation layer

Presentation layer

The presentation layer is concerned with the syntax and semantics of the information exchange between two systems. Specific responsibilities of the presentation layer include the following:
Ø  Translation. The process(running programs) in two systems are usually exchanging  information in the form of character strings, numbers, and so on. The information should be changed to bit streams before being transmitted. Because different computers use different encoding system, the presentation layer is responsible for interoperability between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent into a common format. The presentation layer at the receiving machine changes the common format into its receiver. Dependent format.
Ø  Encryption. To carry sensitive information a system must be able to assure privacy. Encryption means that the sender transformer the original information to another form and sends the resulting message out over the network. Decryption reverses the original process to transform the message back to its original form.
Ø  Compression. Data compression reduces the number of bits contained in the information. Data compression becomes particularly important in the transmission of multimedia such as text, audio and video.

Session layer

Session layer

The services provided by the first four layers (physical, data link, network and transport) are not sufficient for some processes. The session layer is the network dialogue controller. It establishes, and synchronizes the interaction between communicating system. Specific responsibilities of the session layer include the following:
Ø  Dialogue control. The session layer allows two system to enter into a dialogue. It allows the communication between two processes to take place in either half-duplex (one way at a time) or full-duplex (two way at a time) mode.
Ø  Synchronization. The session layer allows a process to add check points (synchronization points) into a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert check point after every 100 pages to ensure that each 100-page unit is received and acknowledged independently In this case, if a crash happens during the transmission of page 515, the only pages that need be resent after system recovery are pages 475 to. Pages previous to 475 need not be resent.

Transport layer

Transport layer

The transport layer is responsible for process-to-process delivery of the entire message. A process is an application program running on the host. Whereas the network layer oversees source-to-destination delivery of individual packets, it does not recognize any relationship between those packets. It treats each one independently, as though each piece belong to a separate message, whether or not it does. The transport layer, on the other hand, ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level. Other responsibilities of the transport layer include the following:
Ø  Service-point addressing. Computers often run several programs at the same time. For this reason, source-to-destination delivery means delivery not only from one computer to the next but also from a specific process (running program) on the other. The transport layer header must therefore include a type of address called a service-point address (or port address). The network layer gets each packet to the correct computer; the transport layer gets the entire message to the correct process on that computer.
Ø  Segmentation and reassembling. A message is divided into transmittable segments, with each segment containing sequence number. These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission.
Ø  Connection control. The transport layer can be either connectionless or connection oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination computer. A connection oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets after all the data is transferred, the connection is terminated.
Ø  Flow control. Like the data link layer, the transport layer is responsible for flow control. However, flow control at this layer is performed end to end rather than across a single link.
Ø  Error control. Like the data link layer, the transport layer is responsible for error control. However, error control at this layer is performed process-to-process rather than to across a single link. The sending transport layer make sure that the entire message arrives at the receiving transport layer without error (damage, loss or duplication). Error correction is usually achieved through transmission.

Network layer

Network Layer

The network layer is responsible for the source-to destination delivery of a packet, possibly across multiple networks (links). Whereas the data link layer oversees the delivery of the packet between two system on the same network (link), the network layer ensures that each packet gets from its point if origin to its final destination.
        If two systems are connected to the same link, there is usually no need for a network layer. However, if the two systems are attached two different networks (link) with connecting devices between the networks (link), there is often a need for the network layer to accomplish source-to-destination delivery. Other responsibilities of the network layer include the following:
Ø  Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem locally. If a packet passes the network boundary, we need another addressing system distinguish the source and destination system. The network layer adds a header to the packet coming from the upper layer that, among other thing, includes the logical addresses of the sender and receiver.
Ø  Routing. When independent networks or links are connected together to create internetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination. One of the function of the network layer is to provides this mechanism.

Data link layer

Data link layer

The data link layer transforms the physical layer, a raw transmission facility, to a reliable link. It makes the physical layer appear error-free to the upper layer(network layer). Other responsibilities of the data link layer include the following:
Ø  Framing. The data link layer divides the stream of bits received from the network layer into manageable data units called frame.
Ø  Physical addressing. If frames are to be distributed to different system on the network, the data link layers add a header to the frame to define the sender and /or receiver of the frame. If the frame is intended for a system outside the sender’s network, the receiver address is the address of the connecting device that connects the network to the next one.
Ø  Flow control. If the rate at which the data is absorbed by the receiver is less than the rate produced at the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.
Ø  Error control. The data link layer adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize a duplicate frame. Error control is normally achieved through a trailer added to the end of the frame.
Ø  Access control. When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.

Physical Lyer

Layers in the OSI model

Physical layer

The physical layer coordinates the function required to carry a bit stream over a physical medium. Physical Layer deals with the mechanical and electrical specifications of the interface and transmission media Physical Layer also defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur.
The physical layer is responsible for moving individual bits from one
(NODE) to the next.
Physical layer is concerned with the following
Ø  Physical characteristics of interfaces and media.                The physical layer defines the characteristics of the interface between the devices and the transmission media. It also defines the type of transmission media.
Ø  Representation of bits. The physical layer data consists of a stream of bits (sequence of 0s and 1s ) with no interpretation. To be transmitted bits must be encoded into signals (electrical or optical). The physical layer defines the type of encoding (how 0s and 1s are changed to signals).
Ø  Data rate.            The transmission rate – the number of bits sent each second –is also defined by the physical layer. In other words, the physical layer defines the duration of a bit, which is how long it lasts.
Ø  Synchronization                                The sender and receiver must not only use the same bit rate but must also be synchronized at the bit level. In other words, the sender and the receiver clocks must be synchronized.
Ø  Line configuration.          The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected together through a dedicated link. In a multipoint configuration a link is shared between several devices .
Ø  Physical topology.            The physical topology define how devices are connected to make a network. Devices can be connected using a mesh topology (every device connected to every other device), a star topology (devices are connected through a central device), a ring topology (each device is connected to the next. Forming a ring), or a bus topology (every device ion a common link)
Ø  Transmission mode         The physical layer also defines the direction of transmission between two devices: simplex, half duplex. In the simplex mode, only one device can send; the other can only receive. The simplex mode is a one way communication. In the half duplex mode, two devices can send and receive, but not at the same time, in a full-duplex (or simple duplex) mode, two devices can send and receive at the same time.

SIP (Session Initiation Protocol)

SIP (Session Initiation Protocol)

SIP is an application layer protocol designed to be independent of the underlying transport layer; it can run on transmission control protocol (TCP), UDP, or SCTP. It is a text based protocol, incorporating many elements of the HTTP and the SMTP.

The session Initiation Protocol is a signaling communication protocol, widely used for controlling multimedia communication sessions such as voice and video calls over IP.
The protocol defines the messages that are sent between peers which govern establishment, terminations and other essential element of call. SIP can be used for creating, modifying, and terminating two party (unicast) or multiparty (multicast) sessions consisting one or several media streams. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer and online games.
SIP work in conjunction with several other application layer protocols that identify and carry the session media identification and negotiation is achieved with session description protocol (SDP). For the transmission of media stream a(voice, video) SIP typically employs the Real-Time transport protocol (RTP), which many be secured with the secure Real-Time transport protocol (RTP). For secure transmissions of SIP message the protocol may be encrypted with transport layer security TLS.

NNTP (Network News Transport Protocol)


NNTP (Network News Transfer Protocol)

The News Transport Protocol (NNTP) is an application protocol used for transporting Usenet news articles (net news) between news server and for reading and posting articles by end client application.
Usenet was originally designed based on the UUCP network, with most article transfer taking place over direct point to point telephone link between news sever and which were powerful time sharing systems. Readers and posters logged into this computer reading the article directly from the local disc.
As local area network and internet participation it became describe to allow news readers to be run on personal computers connected to local networks. Because distributed files system were not yet widely available, a news protocol was developed based on the client server model. It resembled the simple Mail Transfer Protocol (SMTP), but was tailored for exchanging news group article.
A news reader, also known as a news client, is a software application that reads article on Usenet, either directly from the news server's disks or via the NNTP. The well-known TCP port 119 is reserved for NNTP. When client connect to a news server with transport layer security (TLS), TCP port 563 is used. This is sometimes referred to as NNTPS.
In October 2006, the IETF released RFC 3977 which updates the NNTP protocol and codifies many of the additions over the years since RFC977.

Domain Name System


DNS (Domain Name System)

The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorized domain name to the numerical IP addresses needs for the purpose of locating computer services and devices worldwide. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the internet.
An often-used analogy to explain the Domain Name System is that it serves as the phone book for the internet by translating human-friendly computer hostnames into IP addresses. For example the domain name www.example.com translates to the addresses 192.163.0.10 (IPv4) and 2001:500:88:200::10 (IPv6). Unlike a phonebook the DNS can be quick updated, allowing a service's location on the network to change without effecting the end users, who continue to use the same hostname. Users take advantage of this when they use meaningful uniform resource locator (URL) and E-mail addresses without having to known how the computer actually locates the services.
The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name serves for each domain. Authoritative name servers are assigned to be responsible for their particular domain and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has held avoid the need for a single central register to be continually consulted and updated. Additionally the responsibility for maintaining and updating the master record for the domain is spread among many domain name registers, who compete for the end-user's (the domain-owner's) business. Domain can be moved from one registrar to other registrar at any time.
The Domain Name System also specifies the technical functionality of this data base service. It defines the DNS protocol, a detailed specification of the data structures and data communication exchanges used in DNS, as part of the internet protocol suit.

What is Protocol?


Protocols

A communication protocol is (Networking protocol) is a system of digital message formats and rules for exchanging messages in or between computing system and in telecommunications. A protocol may have a formal description. Protocol may include signaling, authentication and error detection and correction capability.
In a routing protocol, it specifies that how routers communicate with each other and with the other types of machines. Protocols are determines and enable the routes between the nodes on a computer network. Algorithms determine the specific choice of routing. A router has knowledge only the direct attached networks and a protocol shares information about the neighbors immediate and then throughout the network. A router can understand the network topology through the protocol. So we can say that a protocol is playing very important role in a network. Although, there are many types of protocols.

Types of protocols

There are many types of protocols for different purpose in networking.

Routing protocols

IS-IS, OSPF, IGRP and EIGRP, RIP, BGP,

Internet protocols

Application Layer

DHCP, DHCPv6, DNS, FTP, HTTP, IMAP, IRC, LDAP, MGCP, NNTP, BGP, NTP, POP, RPC, RTP, RTSP, RIP, SIP, SMTP, SNMP, SOCKS, SSH, Telnet, TLS/SSL, XMPP.

Transport Layer

 TCP, UDP, DCCP, SCTP, RSVP, TP-TCP, NC, MTP

Network Layer

IP(IPv4,IPv6), ICMP, ICMPv6, ECN, IGMP, IPSec, GGP.

Link Layer

ARP/in ARP, NDP, OSPF, TUNNELS (L2TP), PPP,

What is subnet mask?


Subnet mask

A network mask is used when a network is not sub netted. The subnet mask is used to find the first address in the block. However when a mask is sub netted, the situation is different. We must have a subnet mask. The subnet has more 1s.
Subnetting increases the length of the netid and decrease the length of hostid. When we divide a network to s number of subnetworks, each of number of hosts, we can calculate the subnetid for each subnetwork as in which n is the length of netid,.

Subnet Address

When a network is subnetted, the first address in the subnet is the identifier of the subnet and is used by the router to route the packets destined for that subnet works. Given any address in the subnet, the router can find the subnet mask using the same procedure we discussed to find the subnetwork mask. ANDing the given address with the subnet mask.

Super netting

Subnetting couldn’t completely solve address depletion problems in classful addreeing, because most organization did not want to share their granted blocks with others. since class C blocks were still available but the size of block did not meet the requirement of new organization that wanted to join the internet, one solution was super netting . in super netting, an organization can combine several class C block to create a larger range of addresses. In other, words several networks are combined to create a supernet work. By doing this, an organizarion can apply for several class C blocks instead of just one. For example, an organization that needs 1000 addresses can be granted four class C blocks.

What is subnetmask?


Subnetting

In subnetting, a network divides into several smaller networks with each subnetwork  having its own subnetworks. A portion of IP address is indicating the network (netid), and a portion indicates the network hostid. This means that there is a sense of hierarchy in IP addressing. To each a host on the internet, we must first reach the network using the first portion of the address. Then we must reach the host itself using the second portion. In the other word, IP address is designed with two level of hierarchy. However in many cases two levels of hierarchy are not enough. For example, imagine an organization with the network address 141.14.0.0 (a class B address). The organization has two hierarchical addressing, but cannot have more than one physical network. One solution of this problem is subnetting. Further division of a network into smaller networks is called subnetting.

Three level of hierarchy

Adding subnetworks an intermediate level of hierarchy in the IP addressing system. Now we have three levels; site, subnet and host. The site is the first level. The second level is subnet and the tird level is host of hierarchy, it defines the connection of the host to the subnetwork.
The routing of an IP datagram now involves steps: delivery to site, delivery to subnet work and delivery to the host

What is subnetmask?


Mask
If the network address is given, we can find the block and the range of addresses in the block.  What about the reserves? If an address is given, can we find the given address (the beginning address in the block). This is important because to route a packet to the correct network, a router needs to extract a network address from the destination address (a host address) in the packet header.
One way we can find the network address to first find the class of the address and the net ID. We then set the host ID to zero to find the network address. For example, if the address is 134.45.78.2 is given, we can immediately say that the address belong to class B. the net ID is 134.45 (2 bytes)  and the network address is 134.45.0.0.
The above method is feasible if we not subnetted the network; that is, if we have not divided the network into subnetworks. A general procedure that can be used involves a mask to find the network address from a given address.
A mask is a 32 bits binary number that gives first address in the block (the network address). When bit-wise ANDed with an address in the block.

AND Operation
Masking uses the bit-wise AND operation defined in computer science. The operation is applied bit by bit to the address and the mask.

Introduction to IP address


Classes and Blocks

One problem with the classfull addressing is that each class is dividing into a fixed number of blocks with each block having the fixed size. Let’s look
Class A
Class A is divided into 128 blocks with each block having a different net id. First block covers address from 0.0.0.0 to 0.255.255.255 (net id 0). The second block covers address 1.0.0.0 to 1.255.255.255 (net id 1). The last block covers address form 127.0.0.0 to 127.255.255.255 (net id 127).
Note: each block of addresses the first byte (net id) is the same, but the other three bytes (host id) can take any value in the given range.
The first and last block in this are reserved for special purpose as we will discuss shortly. In addition one block is used for private address. The remaining 125 blocks can be assigned to organization. This means that the total number of organization that can have class A address is only 125. However, each block in this class contains 16,777,216 addresses. This address is called network address. It defines the network of the organization, not individual hosts. The organization is not allowed to use last address; it is reserved for a special purpose. Class A address is design for large organization with a large number of hosts or routers attached t their network.
Class B
Class B is divided into 16,384 blocks with each block having a different net id. Sixteen blocks are reserved for private addresses, leaving it 16,368 blocks for assignment to organization. The first block covers address form 128.0.0.0 to 128.0.255.255 (net id 128.0). the last block covers address from 191.255.0.0 to 191.255.255.255 (net id 191.255).
Note: each block of address the first 2 bytes net ID are same but other 2 bytes are host ID can take any value in the given range.
There are 16,368 blocks that can be assigned. This means that the total number of organization that can have class B address is 16,368. However, each block in this class contain 65,536 addresses, the organization should be large enough to use all of these addresses.
Class B was designed for mid size organization that many have tens of thousands of hosts or routers attached to their network. However, the number of addresses in each block 65,536 is larger than the needs of most midsize organizations.
Class C
Class C is divided into 2097152 blocks with each block having a net ID. 256 blocks are used for private addresses, leaving 2,096,896 blocks for assignment to organization. The first block covers address from 192.0.0.0 to 192.0.0.255 (net id 192.0.0). the last address covers address from 223.255.255.0 to 223.255.255.255 (net id 223.255.255).
Note: the each block of address the first 3 bytes are the same but last one byte can take any value in the given range. There are 2096902 blocks that can be assigned have a class C address is 2096902. However, each block in this class contains 256 addresses, which means the organization should be small enough to need less than 256 addresses.
Class C was designed for small size organization with a small number of hosts or routers attached to their network.

Class D
There just one block of class D addresses. It designed for multicasting. Each address in this class is used to define one group of hosts on the internet. When a group is assigned an address in this class, every host that is member of this group will have a multicast address in addition to its normal (unicast) address.
Class E
There is just one block also in class E address. It was designed for used as reserved address. The last address in this class 255.255.255.255 is used for a special address.
Network Addresses
Network addresses play a very important role in classfull addressing. A classful address has several properties:
1-      The network address is the first address in the block
2-      The network address defines the network to the rest of internet.
3-      Given the network address, we can find the class of the address, the block and the range of the addresses in the block.
We try to understand with the example:
Given the network address 132.210.0.0, class is B  because the first byte is between the 128 to 191. The block has net id of 132.21, the address range from 132.21.0.0 to 132.21.255.255.

Introduction to IP address

Class full IP Addressing

IP addressing, when started a few decades ago, used the concept of classes. This architecture is called class full IP addressing. In the mid of 1990s, a new architecture, Called classless IP addressing was introduced that will eventually supersede the original architecture. However, most of the internet is still using calssfull addressing and the migration is slow. To understand the classfull IP addressing it is important to understand classless addressing.
In classfull IP addressing, the IP address is divided into five classes A,B,C,D and E. each class is occupies some part of the whole address space, see below the table mansion the class occupation of the address space (approximate).
A
B
C
D
E

We can see that the class A covers the half of the address space, a serious design flow. Class B cover ¼ of the whole address space, another design flow. Class C is cover the 1/8 of the address, and class D and E each cover the 1/16 of the address space.

Recognize the classes

We can find the class of an address when the address is given in binary notation or in dotted decimal notation.
Find the class in binary notation
If the address is given in binary notation, the first bits can immediately tell us the class of the address.
Find the class in dotted decimal notation
When the address is given in dotted decimal notation, then we need to look only at the first byte to determining the class of the address. Each class has a specific range of number.
Net ID and Host ID
In classfull addressing an IP in classes A,B and C is divided into net id and host id.
Note: Class D and E are not divided into net id and host id.
A
Net ID
Host ID
B
Net ID
Host ID
C
Net ID
Host ID
D
Reserved For Multicast
E
Reserved For future use