Skip to main content

Ethical hacking simplified! (System fundamentals ) OSI reference Model explained continuation.

continuaton

Network addressing

A router must keep record of all its routing protocols differently in its routing table. Every routing protocol keep track of a network with different addressing scheme(IP,IPX and IPv6). For example when sending letter to humans of different languages, the letter has to read the language of the destined person, so that the message would serve its purpose.

Interface: This is the exit interface of the network on the router, to reach to the destined network. It can again be referred to the interface on the router, which packet took to reach to its destination.

Metric: This refers to the distance between to transmission network and the destined network. This distance is measured using hop(number of routers packet passed before reaching to the destined network) count.

Router is the device that works in this layer. An article will be published about the networking devices. Stay turned!

Data Link Layer

This layer is in-charge of delivering data to destined host on the network. When data reached the router on the network. Router doesn't care about the host, all it care about is the destined network. If it send forward the packet the exit interface, the router is through with its work. Upon arriving into the destined network, something must carry on from where the routing stopped. That device is known as switch. As I already mentioned that router deals with IP address (which is a 32bits logical address), the switch deals with MAC also known as hardware address. This is a 48bits address. MAC address is a static address, which is assigned by the manufacturer of the NIC(network interface card). NIC is the card (hardware) on any device that give it the privilege to join the network. Without NIC there is noway one can join football match without legs! Legs are the interface in which humans used to physically control the ball. That's the same with NIC on the network, although NIC doesn't control the network, but without NIC no device can be present on the network. When data is sent over a network, it is encapsulated. So when the router receive the packet, it strip it and check for the destination IP address. When its not in its own network, it re-encapsulate it and forward it to the next hop (router that is more closer to the destined network). One thing you have to know is the main data will never be accessed until it reached is destination.

IEEE (institute of electric and electronic engineers) data link layer has two sub-layers.

MAC(media access control) 802.3: This deals with how packets are been placed on the media. Accessing the media in this sub-layer is based on first come, first serve. The packets here share the same bandwidth. The name physical addressing is defined here, as well as logical topologies.

LLC(logical control unit) 802.2: This is responsible for identifying network layer protocols and then encapsulate them back. This sub-layer tell the data link layer what to do with a packet once the frame is received. When the host receive the frame, it looks into the LLC header to get where the packet is destined, through the IP addressing. This sub-layer again provides flow control and sequencing of control bits.
The devices here are switches and bridges. An article will be published about the networking devices. Stay turned!


Physical layer

Physical layer primary assignment is to send and receive bits. Bits(binary digits) is a base two numeric numbers which only contains 1 and 0. 1 and 0 is the only thing the computer or any other smart devices understand.
The physical layer communicate directly with the communication media (fiber optic, cables and wireless signals). Fiber optic uses light impulses, cable uses electric signals and wireless signals uses the audio or radio frequencies to send and receive data. Different technologies are used to encode and decode different communication medium.
This layer specifies the electrical, mechanical, procedural and functional requirements for enabling, maintaining and disabling communication between end devices. DTE(data terminal equipment) and DCE (data communication equipment) identification is done within the physical layer. The DCE is located at the service provider while the DTE is located at the end-user or the attached device. Again DCE can be describe as the serving device while the DTE is at the client end. DTE converts user data into signals, light impulses or frequency so as to be transmitted. DCE converts data signals, frequency and light impulses at the ISP (internet service provider) end.

The devices here are the Hub and the repeater. An article will be published about the networking devices. Stay turned!

Comments

Popular posts from this blog

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l

iTunes Connect is down!

Something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the wrong accounts.  The service appears to be matching log-ins with the wrong accounts, showing apps and usernames from completely different people. When developers try to access one of the apps, they receive an error message leading them back to their own account. iTunes Connect has since been taken offline as Apple’s engineers presumably set off to fix the problem. We’ve contacted Apple and will update if we hear back. Culled from:  The Next Web

How to Send SMS to any number anonymously

In this technology era, many of us want to send messages anonymously! the reasons might be maintaining privacy, franking etc. But many sees it as impossible! Today I'm going to take you through steps to send SMS/Text message without exposing your identity. This method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS. List of Websites To Send Anonymous SMS To Any Number :- 1   Seasms.com This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number. Must try this. 2   Spicesms.com This site only allows you to send SMS in india. The message service of this site is very fast as the message will be send instantly to the receiver end. 3   Smsti.in This website allows to send SMS in India onl