Network Protocol Analyzer
Network Protocol Analyzer
Tcpdump
Questions for Sessions on 24th November by CC6
Team Noesis (CC 6)
# Members-
- Sourav
- Renuka
- Siddesh
- Masoud
Questions for CC16 and CC17 from CC5
2.what is Lpr?
Question for group cc-16 & cc-17
In which layer of osi model IP utilities works
Question for group cc-17
Why information of NASA is not shown by NSLOOKUP
Questions
1. what is trouble shooting? how it is rectified in your software?
2. what is TTL? how it works?
question for 17
1.waht is ARQ function? how it works?
2. what are the application?
Team mambers:
swetha.m
padma.b.s
shilpa.s
shruthi.k.n
Fwd: Questions from CC-8
Question for CC-16 group:
1. why was IP-5 not introduced ?
By:
CC-8
GroupName:Proxymity
Questions from CC-8
1.What is ARQ and what is the purpose of using ARQ ?
Question for TCPDump:
1.what is UDP ? and give more information on commands using in TCPDUMP ?
BY:CC-8
group name:PROXYMITY
Proxy Servers
Questions for Sessions on 10th November by CC6
traffic (no udp or icmp?
Team Noesis (CC 6)
# Members-
- Sourav
- Renuka
- Siddesh
- Masoud
Questions for CC15 from CC5
Can TCPdump be used in windows platform n how does it protect hacking? |
Add whatever you love to the Yahoo! India homepage. Try now!
question for CC13 from CC5
| what is ARP attack.? how does the tool works against this? |
Keep up with people you care about with Yahoo! India Mail. Learn how.
Network Protocol Analyzer
Questions for network protocol analysers
By
Rajani
Priyonath Banarjee
Bhavnani Poonam
Masudur Rahaman
Questions From CC-8
1.How to calculate Round Trip time ?
Question to CC-12
2.how do effectively maintain Network Traffic ?
From CC-8
PROXYMITY GROUP
Network Protocol Analysers
Can SoftPerfect filter application layer protocol protocols such as HTTP, telnet, ssh etc...??
@ CC-12
What does DHCP do?
From CC-10
Questions for cc-11
from CC-12
Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J
Questions on proxy server!!
1.What are dangerous urls?
@ Srikanth and group
2.In your presentation you told that you could block facebook, but it was not accessible before also. Explain the same.
--
Sahana
Questions by group CC 15
What kind of information will a protocol analyzer provide to help troubleshoot or maintain the overall health of LAN ?
for cc 12
can a protocol analyzer work over a WAN ?
TO CC11 and CC12
>what is STM?
Question
| Which operating system supports network protocol analyzer the best? Group CC 17: Uttamani Hitesh Yeshwant Singh Yukteshwaraditya Singh Parihar Zeshta Bhat |
Questions from CC 19
Q's by CC3
In which layer of the OSI reference model does the software work? Because it filters packets on different protocols which are from different layers eg: IP, TCP, ARP etc...
To CC12
Where should the software reside whether in user's system, routers or gateway to get the best result?
Questions posted on topic "Network analyzer" by CC3
group members:
Pratik Vasani
Arpith U.K
Prashant Maski
Sagar K.V
Questions for Sessions on 3rd November by CC6
# Questions by-
Team Noesis (CC 6)
# Members-
- Sourav
- Renuka
- Siddesh
- Masoud
Questions by CC19
Questions on FTP:
@srikanth---- how do i set up an ftp server? can this cause serious security problems?questions submitted by: cc 16priya m.skarthik kdarshan thappasatchidanand das
CC-12 questions
Does using the proxy server slow down the web browser?
By:
Sahana.P.Shankar
Raksha.J
Shruthi Raghavan
Sai Janaki Tejaswi P
CC-12 questions
Is it safe to use proxy servers from public lists on the web?
By CC-12
Sahana.P.Shankar
Shruthi Raghavan
Sai Janaki Tejaswi P
Raksha.j
Question on proxy servers
What are dangerous URLs ?
for group CC10
What are the ways in which filezilla can check attacks from the errors handled on SSL/TLS secured data transfers.
Questions from CC20
1.does the IP Address of a computer changes frequently?If yes/no,plz give the reasons behind it.
2.What is IP filtering ?
from:cc20
Questions!!!!
1. How to unblock a blocked site?
2. I have downloaded a free proxy server, but proxy doesn't work, though it's a successfully tested. What could be the reason?
@ siddharth :
1. Where to get and how to check proxy lists?
Questions from CC06
1)is there any way that i can enter the website without revealing my real ip address??
2)can a proxy server be used as a firewall?
by CC06
Renuka Jadhav
Sourav Roy
Siddesh
Massoud
CC-12 questions
Is it safe to use proxy servers from public lists on the web?
By CC-12
Sahana.P.Shankar
Shruthi Raghavan
Sai Janaki Tejaswi P
Raksha.j
CC-12 questions
Does using the proxy server slow down the web browser?
By:
Sahana.P.Shankar
Raksha.J
Shruthi Raghavan
Sai Janaki Tejaswi P
Questions on proxy server
| What is the difference between open proxy server and transparent proxy server? by CC5 |
Question on proxy server
Question for proxymity group:
Proxy Servers
Q's for CC8
2) Explain how to configure proxy using s/w or h/w. How will it work??
By CC3
Arpith
Prashant
Prateek
Sagar
Questions by CC10
--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E
CC7 questions
By CC-12:
Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J
Questions from CC18
1.If there's a hit in cache then the time duration is less, in case there's a miss won't it take a longer time than directly accessing the main server??
2.How can we recognize a failure in the proxy server??
Team:
- Rakshita Shetty
- Vatsal Doshi
- Sharath Babu
- Sushma Rao
- Sahana P
Questions for Sessions on 13th & 20th October by CC6
# Remote Login (for Nithin & group):
1) How does WINSCP support Remote Login?
# Questions by-
Team Noesis (CC 6)
# Members-
- Sourav
- Renuka
- Siddesh
- Masoud
CC8 questions
By CC-12
Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J
CC6 questions
By CC-12
Sahana.P.Shankar
Sai Jankai Tejaswi P
Shruthi Raghavan
Raksha J
Questions!!!!!
how does file share work?
@nitin n group
what is difference between file transfer n file share?
By cc1
Questions!!!!!
How do we speed up http tunneling?
@Ahmed n group
How do we increase web logic server memory?
@Vijeta n group
How to change proxy server password?
By cc1
Questions by CC19
By Nithin & group
Remote Login- Noesis (CC06)
This is a program we made to connect a server & a client system-
SERVER
Imports System
Imports System.IO
Imports System.Net
Imports System.Net.Sockets
Imports System.Text
Imports Microsoft.VisualBasic
Module Module1
Sub Main()
Dim server As TcpListener
server = Nothing
Try
' Set the TcpListener on port 13000.
Dim port As Int32 = 13000
Dim localAddr As IPAddress = IPAddress.Parse("127.0.0.1")
server = New TcpListener(localAddr, port)
' Start listening for client requests.
server.Start()
' Buffer for reading data
Dim bytes(1024) As Byte
Dim data As String = Nothing
' Enter the listening loop.
While True
Console.Write("Waiting for a connection... ")
' Perform a blocking call to accept requests.
' You could also user server.AcceptSocket() here.
Dim client As TcpClient = server.AcceptTcpClient()
Console.WriteLine("Connected!")
data = Nothing
' Get a stream object for reading and writing
Dim stream As NetworkStream = client.GetStream()
Dim i As Int32
' Loop to receive all the data sent by the client.
i = stream.Read(bytes, 0, bytes.Length)
While (i <> 0)
' Translate data bytes to a ASCII string.
data = System.Text.Encoding.ASCII.GetString(bytes, 0, i)
Console.WriteLine("Received: {0}", data)
' Process the data sent by the client.
Dim msg As Byte() = System.Text.Encoding.ASCII.GetBytes("Your request has been syccesfully recieved")
' Send back a response.
stream.Write(msg, 0, msg.Length)
Console.WriteLine("Sent: {0}", data)
i = stream.Read(bytes, 0, bytes.Length)
End While
' Shutdown and end connection
client.Close()
End While
Catch e As SocketException
Console.WriteLine("SocketException: {0}", e)
Finally
server.Stop()
End Try
Console.WriteLine(ControlChars.Cr + "Hit enter to continue....")
Console.Read()
End Sub
End Module
CLIENT
Imports System.Net.Sockets
Module Module1
Sub Main()
Console.WriteLine("Enter server IP Address and then press Enter... " & vbCrLf)
Dim IP As String = Console.ReadLine()
Console.Write("Eneter your message and press Enter..." & vbCrLf)
Dim message As String
message = Console.ReadLine
Connect(IP, message)
End Sub
Private Sub Connect(ByVal server As [String], ByVal message As [String])
Try
' Create a TcpClient.
' Note, for this client to work you need to have a TcpServer
' connected to the same address as specified by the server, port
' combination.
Dim port As Int32 = 13000
Dim client As New TcpClient(server, port)
' Translate the passed message into ASCII and store it as a Byte array.
Dim data As [Byte]() = System.Text.Encoding.ASCII.GetBytes(message)
' Get a client stream for reading and writing.
' Stream stream = client.GetStream();
Dim stream As NetworkStream = client.GetStream()
' Send the message to the connected TcpServer.
stream.Write(data, 0, data.Length)
Console.WriteLine("Sent: {0}", message)
' Receive the TcpServer.response.
' Buffer to store the response bytes.
data = New [Byte](256) {}
' String to store the response ASCII representation.
Dim responseData As [String] = [String].Empty
' Read the first batch of the TcpServer response bytes.
Dim bytes As Int32 = stream.Read(data, 0, data.Length)
responseData = System.Text.Encoding.ASCII.GetString(data, 0, bytes)
Console.WriteLine("Received: {0}", responseData)
' Close everything.
stream.Close()
client.Close()
Catch e As ArgumentNullException
Console.WriteLine("ArgumentNullException: {0}", e)
Catch e As SocketException
Console.WriteLine("SocketException: {0}", e)
End Try
Console.WriteLine(ControlChars.Cr + " Press Enter to continue...")
Console.Read()
End Sub 'Connect
End Module
Connecting Sourav's & Masoud's Systems. Live Demo
Question by group 15
Vivek (Visit My Site)
Rohit
Raunak
Preetham
For remote login session on 13th October
How remote login achieves File, printer and other redirection??
Arpith
Prashant
Prateek
Sagar
Question goes to CC6
by CC8
Tejus
Chaitra
Vishal
Vijetha
Question by CC10
--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E
Questions by CC19
Question by CC10
--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E
QUESTIONS ON REMOTE LOGIN
question submitted by:
priya m.s
satchidanand das
karthik k
darshan thapa
Questions on Remote login
Do we get administrative privileges of the remote computer??
@Syed ahmed and group:
Can two people login to a remote computer simultaneously?? If yes, how?
Questions by CC18:
- Sharath Babu
- Sushma Rao
- Vatsal Doshi
- Rakshita Shetty
- Sahana. P
Remote Login
Questions by CC12
2. How does the address resolution protocol stack map the logicl IP address to the physical MAC address of the LAN????
3. How does sky propagation differ from line-of-straight propagation??
RAKSHA.J
SAHANA.P.SHANKAR
SAI JANAKI THEJASWI
SHRUTHI .RAGHAVAN
Question on remote login
2.Why doesn't the firewall block the remote login?
Chaithra T R
Tejus R
Vijetha P C
Vishal agarwal
Questions for Sessions on 6th October by CC6
# Questions by-
Team Noesis (CC 6)
# Members-
- Sourav
- Renuka
- Siddesh
- Masoud
Questions from cc5
2) What is DNA Spoofing?
Questions by CC09
Team members:
Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh
Questions
which is the tool which does that?
What is a heterogeneous network?
posted by:-
Hitesh
Yeshwant singh
Yukteshwaraditya
Zeshta bhat
Questions on cc from cc20
1. What are sockets?
2. What is PuTTY?
3.How security is provided in your software?
Team members:
swetha.m
shilpa.s
padma.b.s
shruthi.k.n
Questions by CC8
by cc8:
Chaithra
Tejus
vijetha
vishal
Questions By CC12
Qs from CC3(Sagar, Arpit, Prashant, Prateek)
What is the need of using the proxy, if the IP is transparent(was mentioned in types of proxy)?
What Tunnel/IRC and SSL Proxy?? How they help security??
Q's for CC1(Soumya and Group)
Think that i have to send a mail what are the protocols involved? and explain the work of each layer in transmission of mail.
Team
Questions!!
--
Sahana
Video of protocol stack data transmission
video of protocol stack data transmission:
Questions on 29th september presentations
what is PAC (proxy auto config) file?
question for protocol stacking?
how different are transport layers of TCP and UDP?
submitted by CC16
darshan thappa
priya m.s.
satchidanand das
karthik k.
Questions by CC10
How did the proxyfire select the 17 proxies?
Protocol Stack and Addressing:
Consider a system with a DSL modem/router and a wifi router. The modem connects to the router through the WAN port on the router. Assume that DHCP is enabled on both. The ip range for DHCP is 192.168.0.X to 192.168.0.Y on the modem and on the router. There is a machine which is connected to the router through the LAN port and a system that accesses the internet wirelessly. If the two machines want to access the network resources simultaneously, will there be a conflict? If yes, why and how to resolve it. If no, why not?
--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E
Questions by CC4
How HTTP is different from SOCKS?
BY CC4
Presentation by CC15
| To view the pdf or download please follow the link below: http://www.keepandshare.com/doc/view.php?id=1419143&da=y |
QUESTIONS by CC19
Question:CC20
1. what is inbound/netbound traffic and how is it recognised in reverse proxy?
QUESTION:-IP ADDRESSING AND PROTOCOL STACK:
1. what is cataloging in enterprise ip address manager
a.what is hop?
b.what is classless addressing
TEAM MEMBERS:- CC20
1.swetha.m
2.shilpa.s
3.padma.b.s
4.shruthi.k.n
Question on http proxy server
from cc11
Shreyas.H.D
Prabhakara.S.H
Vijay.S.S
Sharath.S
Questions by CC9
Why use a proxy server to get a different IP when you can simply mask it?
Question for Protocol Stack:
How does Real Hide IP protect from hackers?
Team members:
Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh
Questions for Sessions on 29th September by CC6
2) What is secure socket layer (SSL)?
3) How is Proxy Server different from Open DNS?
2) How does routing selection happen in network layer?
# Questions by-
Team Noesis (CC 6)
# Members-
- Sourav
- Renuka
- Siddesh
- Masoud
An introduction to TCP/IP utilities
Transmission Control Protocol/Internet Protocol is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."
Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem.
- ARP
- Nbtstat
- Netstat
- Ping
- Route
- Tracert
- Winipcfg
Network Protocol Analyzer by CC12
NETWORK PROTOCOL ANALYZER
The packet analyzer (also known as a network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications.
USES:
The versatility of packet sniffers means they can be used to:
Analyze network problems
Detect network intrusion attempts
Gain information for effecting a network intrusion
Monitor network usage
Gather and report network statistics
Filter suspect content from network traffic
Spy on other network users and collect sensitive information such as passwords (depending on any content encryption methods which may be in use)
Reverse engineer proprietary protocols used over the network
Debug client/server communications
Debug network protocol implementations
NOTABLE PACKET ANALYZERS:
- Carnivore
- dSniff
- Ettercap
- Fluke Lanmeter
- Microsoft Network Monitor
- OPNET Technologies ACE Analyst
- NetScout Sniffer Global Analyzer
- NetScout Sniffer Portable Professional Analyzer
- Network Instruments Observer
- NetworkMiner packet analyzer
- PacketTrap pt360 Tool Suite
- snoop (part of Solaris)
- tcpdump
- WildPackets OmniPeek (old name AiroPeek, EtherPeek)
- Wireshark (formerly known as Ethereal)
- NetworkActiv PIAFCTM
- Capsa
- Cain and abel
- Clarified Analyzer
WIRESHARK:
Wireshark is a free packet analyzer computer application. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues.
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network
packets and tries to display that packet data as detailed as possible.
You could think of a network packet analyzer as a measuring device used to examine what's going
on inside a network cable, just like a voltmeter is used by an electrician to examine what's going on
inside an electric cable (but at a higher level, of course).
In the past, such tools were either very expensive, proprietary, or both. However, with the advent of Wireshark, all that has changed.
Wireshark is perhaps one of the best open source packet analyzers available today.
SOME INTENDED PURPOSES:
Here are some examples people use Wireshark for:
• network administrators use it to troubleshoot network problems.
• network security engineers use it to examine security problems.
• developers use it to debug protocol implementations.
• people use it to learn network protocol internals.
The following are some of the many features Wireshark provides:
• Available for UNIX and Windows.
• Capture live packet data from a network interface.
• Display packets with very detailed protocol information.
• Open and Save packet data captured.
• Import and Export packet data from and to a lot of other capture programs.
• Filter packets on many criteria.
• Search for packets on many criteria.
• Colorize packet display based on filters.
• Create various statistics.
Stop & Wait by CC3
STOP AND WAIT
Design and Implementation
Assumption: Error free communication channel
The sender in this protocol simply retrieves a packet from the network layer, copies it into a frame, and then transmits it. After transmission, the sender busy waits until an acknowledgement is received from the receiver, then the loop starts over again.
The receiver simply busy waits until a frame is received. Once a frame is received it passes the data packet to the network layer and sends an acknowledgement for the frame it just received. It then loops back to busy waiting and the process continues until the End of File is reached.
In this protocol, there can only be one outstanding frame at a time so no sequence numbers are required and the acknowledgement the receiver sends back to the sender is nothing more than an empty frame, as there is no other possibility then acknowledging the only frame sent. Another frame will not be sent until this acknowledgement is received.
Performance
The Stop and Wait protocol was very easy to implement and runs very quickly and efficiently. It solves the problem of congestion, as only one frame is outstanding at any time, frames cannot be lost due to congestion and the receiver will not be swamped by the sender.
Point of failure
The problem with it is that it assumes an error free communication channel and in the real world, such a channel does not exist. It is easy to see that if a frame or an acknowledgement gets lost or damaged, a deadlock situation will occur where neither the sender or receiver can advance, and they will be thrown into infinite loops.
Proxy Servers by CC09
In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has two purposes:
To keep machines behind it anonymous (mainly for security).
To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers or the Internet. A reverse proxy is a proxy used as a front-end to accelerate and cache in-demand resources (such as a web page).
Remote Login- CC4
What is Remote login?
Hello friends in this post i am going to tell you one of the most important concepts of networking that is Remote Login. Here in this post i will tell you what the Remote Login is, how it works and many other things related to it.
In simple words Remote Login means to access other computers on the network or on the other network by the use of telnet or rlogin command. In other words we can also say that Remote Login means to access native computer from the other computer on the network when you are connected to the internet. Generally there are two protocols that are used for Remote Login:
1.RLOGIN Protocol Overview
2.TELNET Protocol Overview
For using the TELNET command for remote login the syntax is:
-->telnet hostname
After connecting with the remote host, you will be prompted for your login id and your password just as if you were logging on via a terminal on that system.
For using the RLOGIN command for remote login the syntax is:
-->rlogin hostname
This command provides an advantage over the telnet command that is here in this command you can specify a username on the command line, and can set it up so that when you rlogin to a host you will not be prompted for a password. Rlogin assumes you wish to login to an account with the same name as the account you are presently logged in as. If you wish to change this, use the -l option.
How Desktop Sharing Works
Remote Login
Let's say you're preparing a huge PowerPoint presentation for a big meeting on Friday. All of the PowerPoint files and PDFs and images that you want to use in your presentation are saved on the hard drive of your work computer. Thursday rolls around and you wake up with a nasty stomach virus. You don't feel well enough to go to the office, but you need to finish that presentation. Here's where remote login can help.
Until recently, virtual private networks (VPN) were the only way to remotely access work files from home. But VPN access isn't the same as accessing the hard drive of your work computer. VPN gives you access to the local area network (LAN) at your office. With VPN, you're only able to access your PowerPoint presentation files if you've saved them on the network, not just on your computer's hard drive.
Remote login, however, uses simple desktop sharing software to give you a "remote control" for accessing your computer -- and all of its software and hard drive files -- from any Internet-connected device anywhere in the world.
Remote login works exactly the same way as desktop sharing. In desktop sharing, there are two separate parties: the host computer and the remote user. To share a desktop, the host computer allows a remote user to view the contents of the host computer's desktop over the Internet. The host computer can also hand over keyboard and mouse controls to the remote user. With remote log-in, your home or work computer is the host and you (in this case) are the remote user.
Remote login requires three basic components:
1. Software download
2. Internet connection
3. Secure desktop sharing network
Question For Wireshark
1. how ethernet helps in this wireshark? what is the purpose of using this?
TEAM MEMBERS:
1.Swetha.M
2.Shruthi.K.N
3.Baharan
4.Malihe
Question for transmission media:
1. how the cross talk is done? reason for crosstalk?
2.what is repeater? what is purpose of using it?
TEAM MEMBERS:
Swetha.M
Shruthi.K.N
Baharan
Malihe
Protocol Stack & Addressing
The Physical Layer defines the electrical and physical specifications for devices. In particular, it defines the relationship between a device and a physical medium. This includes the layout of pins, voltages, cable specifications, Hubs, repeaters, network adapters, Host Bus Adapters (HBAs used in Storage Area Networks) and more.
To understand the function of the Physical Layer in contrast to the functions of the Data Link Layer, think of the Physical Layer as concerned primarily with the interaction of a single device with a medium, where the Data Link Layer is concerned more with the interactions of multiple devices (i.e., at least two) with a shared medium. The Physical Layer will tell one device how to transmit to the medium, and another device how to receive from it (in most cases it does not tell the device how to connect to the medium). Standards such as RS-232 do use physical wires to control access to the medium.
The major functions and services performed by the Physical Layer are:
* Establishment and termination of a connection to a communications medium.
* Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.
* Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.
Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a Transport Layer protocol that runs over this bus. Various Physical Layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the Data Link Layer. The same applies to other local-area networks, such as Token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.
Layer 2: Data Link Layer
The Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work, in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in modern data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on Ethernet, and, on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the Transport Layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages.
The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete Data Link Layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol.
Both WAN and LAN services arrange bits, from the Physical Layer, into logical sequences called frames. Not all Physical Layer bits necessarily go into frames, as some of these bits are purely intended for Physical Layer functions. For example, every fifth bit of the FDDI bit stream is not used by the Layer.
Layer 3: Network Layer
The Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer. The Network Layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer—sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is hierarchical.
The best-known example of a Layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of errored packets so they may be discarded. When the medium of the next hop cannot accept a packet in its current length, IP is responsible for fragmenting the packet into sufficiently small packets that the medium can accept.
A number of layer management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the Network Layer. These include routing protocols, multicast group management, Network Layer information and error, and Network Layer address assignment. It is the function of the payload that makes these belong to the Network Layer, not the protocol that carries them.
Layer 4: Transport Layer
The Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.
Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the Transport Layer, typical examples of Layer 4 are the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
Of the actual OSI protocols, there are five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least error recovery) to class 4 (TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the Session Layer. Also, all OSI TP connection-mode protocol classes provide expedited data and preservation of record boundaries, both of which TCP is incapable.
Layer 5: Session Layer
The Session Layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The Session Layer is commonly implemented explicitly in application environments that use remote procedure calls.
Layer 6: Presentation Layer
The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them. The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack.
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and other data structures from and to XML.
Layer 7: Application Layer
The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network resources for the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application layer implementations include Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and X.400 Electronic Mail.
BY:
CC01

