Instantly find and stop attacks with a fully automated platform that simplifies security. Palo Alto has been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row.
Instantly find and stop attacks with a fully automated platform that simplifies security. Palo Alto has been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row.
The document discusses various protocols at the network layer of the TCP/IP model, including ICMP, IGMP, ARP, and RARP.
ICMP is a control protocol used for network administration and management. It carries network status information such as issues, congestion, and host accessibility. IGMP is used to manage Internet Protocol multicast group memberships. ARP resolves IPv4 addresses to MAC addresses to allow communication between network applications and the datalink layer. RARP is a reverse address resolution protocol that allows a client to request its IPv4 address from the network when it only knows its MAC address.
The document provides an overview of the TCP/IP network model. It discusses the four layers of the TCP/IP model: application layer, transport layer, internet layer, and network access layer. The application layer contains protocols like HTTP and FTP that allow applications to access networked services. The transport layer uses TCP and UDP to deliver data and provide reliability. The internet layer handles routing and uses IP. The network access layer deals with physical network components like cables and network interface cards.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It also explains the four layers of the TCP/IP model and some of the common protocols used in each layer such as IP, TCP, UDP, HTTP, FTP etc. Additionally, it summarizes the Address Resolution Protocol (ARP), which maps IP addresses to MAC addresses when a host needs to deliver a packet on a local network.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It then explains the five layers of the TCP/IP model and how encapsulation works. The document also covers topics such as addressing, fragmentation, segmentation, and IP addressing and subnetting.
This document provides a course syllabus for the subject "Communication Networks". It includes:
1) An outline of 5 units that will be covered in the course, including fundamentals of data communications, media access and internetworking, routing, transport layer protocols, and application layer.
2) Course objectives to understand network layering and functionality and analyze network solutions.
3) 4 course outcomes related to identifying network components, choosing layer functionality, and tracing information flow.
4) A mapping of course outcomes to 12 program outcomes and 3 program specific outcomes.
This document provides an overview of Ethernet and Address Resolution Protocol (ARP) concepts. It describes the operation of the Ethernet sublayers including the logical link control (LLC) and media access control (MAC) sublayers. It explains how ARP works to resolve IP addresses to MAC addresses through ARP requests and maintaining an ARP table. It also discusses how ARP entries can be removed from the ARP table over time or manually.
A network connects two or more computers together. Networks are classified based on their topology, protocols, and architecture. Common topologies include bus, ring, and star. Protocols like Ethernet and Token Ring define how computers communicate. Architectures are either peer-to-peer or client/server. Devices connect directly in peer-to-peer while clients rely on a central server in a client/server network.
Network protocols are sets of rules that allow devices to communicate over a network by standardizing how data is transmitted and received. They provide a common language that defines formatting, transmission, and reception of data so that devices can interact regardless of differences in infrastructure, design, or standards. For communication to occur, both sending and receiving devices must support and follow the same protocol conventions. Standard network protocols enable connectivity for virtually all network users.
The document discusses various protocols at the network layer of the TCP/IP model, including ICMP, IGMP, ARP, and RARP.
ICMP is a control protocol used for network administration and management. It carries network status information such as issues, congestion, and host accessibility. IGMP is used to manage Internet Protocol multicast group memberships. ARP resolves IPv4 addresses to MAC addresses to allow communication between network applications and the datalink layer. RARP is a reverse address resolution protocol that allows a client to request its IPv4 address from the network when it only knows its MAC address.
The document provides an overview of the TCP/IP network model. It discusses the four layers of the TCP/IP model: application layer, transport layer, internet layer, and network access layer. The application layer contains protocols like HTTP and FTP that allow applications to access networked services. The transport layer uses TCP and UDP to deliver data and provide reliability. The internet layer handles routing and uses IP. The network access layer deals with physical network components like cables and network interface cards.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It also explains the four layers of the TCP/IP model and some of the common protocols used in each layer such as IP, TCP, UDP, HTTP, FTP etc. Additionally, it summarizes the Address Resolution Protocol (ARP), which maps IP addresses to MAC addresses when a host needs to deliver a packet on a local network.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It then explains the five layers of the TCP/IP model and how encapsulation works. The document also covers topics such as addressing, fragmentation, segmentation, and IP addressing and subnetting.
This document provides a course syllabus for the subject "Communication Networks". It includes:
1) An outline of 5 units that will be covered in the course, including fundamentals of data communications, media access and internetworking, routing, transport layer protocols, and application layer.
2) Course objectives to understand network layering and functionality and analyze network solutions.
3) 4 course outcomes related to identifying network components, choosing layer functionality, and tracing information flow.
4) A mapping of course outcomes to 12 program outcomes and 3 program specific outcomes.
This document provides an overview of Ethernet and Address Resolution Protocol (ARP) concepts. It describes the operation of the Ethernet sublayers including the logical link control (LLC) and media access control (MAC) sublayers. It explains how ARP works to resolve IP addresses to MAC addresses through ARP requests and maintaining an ARP table. It also discusses how ARP entries can be removed from the ARP table over time or manually.
A network connects two or more computers together. Networks are classified based on their topology, protocols, and architecture. Common topologies include bus, ring, and star. Protocols like Ethernet and Token Ring define how computers communicate. Architectures are either peer-to-peer or client/server. Devices connect directly in peer-to-peer while clients rely on a central server in a client/server network.
Network protocols are sets of rules that allow devices to communicate over a network by standardizing how data is transmitted and received. They provide a common language that defines formatting, transmission, and reception of data so that devices can interact regardless of differences in infrastructure, design, or standards. For communication to occur, both sending and receiving devices must support and follow the same protocol conventions. Standard network protocols enable connectivity for virtually all network users.
This document provides an overview of CCNA Module 1 on internetworking. It describes the purpose of routers, switches, hubs and other network devices. It also covers networking concepts like collision domains, broadcast domains, and the operation of Ethernet networks using CSMA/CD. The document explains the OSI model layers and compares it to the TCP/IP model. It also discusses common network applications and protocols like TCP, UDP, IP, ARP and ICMP.
Client Server Network and Peer to Peer.pptxDevChaudhari17
The document discusses different network models and their key differences. A client-server network uses centralized servers to store data and respond to client requests. In a peer-to-peer network, each node acts as both a client and server by sharing its own resources and consuming resources from other nodes. The document also covers congestion in networks and different techniques for congestion control, including open loop methods like adjusting transmission policies and closed loop methods that react to congestion like backpressure.
This document provides an overview of networking concepts including network types, medium access control protocols, TCP/IP protocol suite, addressing, Ethernet frames, ARP, and standards organizations. It begins with an agenda that lists these topics and includes diagrams to illustrate CSMA/CD, the OSI model, TCP/IP encapsulation, and Ethernet encapsulation. Examples are provided for different network devices, addressing formats and protocols.
The document discusses the four layers of the TCP/IP model:
(1) Application layer which provides access to networked services and contains protocols like TCP and UDP;
(2) Transport layer which ensures reliable delivery using protocols like TCP and UDP;
(3) Internet layer which handles data routing using the IP protocol;
(4) Link layer which consists of device drivers and network interface cards to communicate over physical media like cables.
Chapter 4 internetworking [compatibility mode]Sĩ Anh Nguyễn
The document provides an overview of network layer concepts including internetworking, IP addressing, routing protocols, and routing algorithms. Some key points include:
- Internetworking allows different networks to connect through protocols like virtual circuits and tunneling.
- IP addresses identify systems on a network and consist of a network portion and host portion. Private IP addresses are used internally.
- Routing protocols like RIP, OSPF, and BGP allow routers to share route information and determine the best path between networks.
- Subnetting divides network classes into smaller subnets to better manage IP addresses and network design.
This document discusses several types of computer networks:
- Cloud interconnection networks which connect servers hierarchically and must provide scalability, low cost, low latency and high bandwidth. InfiniBand is commonly used.
- Storage area networks which connect servers to storage devices using Fiber Channel protocol and provide block storage transfers.
- Content delivery networks which replicate and deliver content from origin servers to edge caches for improved performance and scalability.
- Overlay networks which are built on top of physical networks and are used in peer-to-peer, content delivery, and client-server systems. Scale-free networks follow a power law degree distribution and many real-world networks have this property.
The document discusses the TCP/IP protocol suite. It provides a brief history, stating that TCP/IP was created by DARPA in the 1970s for ARPANET and was designed for UNIX. It describes the key protocols of TCP and IP and compares the TCP/IP model to the OSI model. The document outlines the layers of TCP/IP including the application, transport, network, and physical/data link layers. It notes advantages like being nonproprietary and compatible with all systems, and disadvantages including size and potential speed issues.
presentation on TCP/IP protocols data comunicationsAnyapuPranav
The document provides an overview of the TCP/IP protocol architecture. It discusses the five layers of TCP/IP including the physical, network access, internet, transport, and application layers. It describes the protocols used at each layer, such as IP, TCP, UDP, HTTP, and FTP. The document also discusses how data is encapsulated as it passes through each layer of the TCP/IP model and is transmitted from one host to another across networks and the internet.
This presentation is about a range of computer network that are explained in detail. I recommend you have microsoft powerpoint 2010 or later for smooth running of the presentation. There are also animations in this presentation. Please enjoy, download and follow.
The document discusses computer networks and network protocols. It begins with an introduction to network protocols and the Internet protocols. It then provides definitions and explanations of communication protocols, including addressing, transmission modes, and error detection/recovery techniques. It lists and describes common network protocols like TCP/IP, routing protocols, FTP, SMTP, and more. It also discusses the OSI model layers, TCP/IP protocol suite, data encapsulation, protocol data units, protocol assignments to layers, and addresses at each layer.
The document discusses network terminology and components. It explains that networks require network operating systems and protocols to enable communication between computers. It provides details on the OSI model and how data travels through each layer from application to physical. TCP/IP protocols map to the OSI layers, with TCP and IP operating at the transport and network layers to deliver data between devices on a network.
The document discusses networking concepts such as network topologies, devices, and the OSI model. It begins by explaining how businesses realized networking could increase productivity and save costs. It then describes common networking devices like NICs, hubs, switches, and routers. The document also covers standard network topologies and the layers of the OSI model, providing examples of how data is encapsulated as it travels through each layer.
Port numbers are used to identify protocols and applications using the TCP/IP protocol suite. Some common port numbers and their associated protocols include port 80 for HTTP, port 443 for HTTPS, port 25 for SMTP email, and port 53 for DNS. Port numbers help direct network traffic to the appropriate application or service.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
The document discusses layer 3 switches, which are networking devices that can perform the routing functions of traditional routers but at faster speeds through hardware-based forwarding. Layer 3 switches determine packet forwarding through layer 3 addresses, run routing protocols, and provide benefits like high performance, scalability, and lower latency compared to routers. While layer 3 switches can replace routers for intra-network routing, routers are still needed for connections to wide area networks.
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
The document provides an overview of protocol architectures and the TCP/IP protocol stack. It discusses how protocol architectures establish rules for exchanging data between systems using layered protocols. The TCP/IP model is then explained in detail through its five layers - physical, network access, internet, transport and application - and core protocols like IP, TCP and UDP. Key differences between IPv4 and IPv6 are also summarized.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
ZigBee is a wireless networking technology built on the IEEE 802.15.4 standard designed for low-power devices. It enables reliable, cost-effective networks for applications that require low data rates, long battery life, and secure networking. ZigBee is ideal for remote control and automation applications due to its low power consumption and long battery life. The technology uses small, low-power digital radios based on IEEE 802.15.4 and allows self-healing networks to be formed from transceivers. ZigBee networks are secured with 128-bit AES encryption and can connect thousands of devices together wirelessly.
Ähnlich wie Instantly find and stop attacks with a fully automated platform that simplifies security. Palo Alto has been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row.
This document provides an overview of CCNA Module 1 on internetworking. It describes the purpose of routers, switches, hubs and other network devices. It also covers networking concepts like collision domains, broadcast domains, and the operation of Ethernet networks using CSMA/CD. The document explains the OSI model layers and compares it to the TCP/IP model. It also discusses common network applications and protocols like TCP, UDP, IP, ARP and ICMP.
Client Server Network and Peer to Peer.pptxDevChaudhari17
The document discusses different network models and their key differences. A client-server network uses centralized servers to store data and respond to client requests. In a peer-to-peer network, each node acts as both a client and server by sharing its own resources and consuming resources from other nodes. The document also covers congestion in networks and different techniques for congestion control, including open loop methods like adjusting transmission policies and closed loop methods that react to congestion like backpressure.
This document provides an overview of networking concepts including network types, medium access control protocols, TCP/IP protocol suite, addressing, Ethernet frames, ARP, and standards organizations. It begins with an agenda that lists these topics and includes diagrams to illustrate CSMA/CD, the OSI model, TCP/IP encapsulation, and Ethernet encapsulation. Examples are provided for different network devices, addressing formats and protocols.
The document discusses the four layers of the TCP/IP model:
(1) Application layer which provides access to networked services and contains protocols like TCP and UDP;
(2) Transport layer which ensures reliable delivery using protocols like TCP and UDP;
(3) Internet layer which handles data routing using the IP protocol;
(4) Link layer which consists of device drivers and network interface cards to communicate over physical media like cables.
Chapter 4 internetworking [compatibility mode]Sĩ Anh Nguyễn
The document provides an overview of network layer concepts including internetworking, IP addressing, routing protocols, and routing algorithms. Some key points include:
- Internetworking allows different networks to connect through protocols like virtual circuits and tunneling.
- IP addresses identify systems on a network and consist of a network portion and host portion. Private IP addresses are used internally.
- Routing protocols like RIP, OSPF, and BGP allow routers to share route information and determine the best path between networks.
- Subnetting divides network classes into smaller subnets to better manage IP addresses and network design.
This document discusses several types of computer networks:
- Cloud interconnection networks which connect servers hierarchically and must provide scalability, low cost, low latency and high bandwidth. InfiniBand is commonly used.
- Storage area networks which connect servers to storage devices using Fiber Channel protocol and provide block storage transfers.
- Content delivery networks which replicate and deliver content from origin servers to edge caches for improved performance and scalability.
- Overlay networks which are built on top of physical networks and are used in peer-to-peer, content delivery, and client-server systems. Scale-free networks follow a power law degree distribution and many real-world networks have this property.
The document discusses the TCP/IP protocol suite. It provides a brief history, stating that TCP/IP was created by DARPA in the 1970s for ARPANET and was designed for UNIX. It describes the key protocols of TCP and IP and compares the TCP/IP model to the OSI model. The document outlines the layers of TCP/IP including the application, transport, network, and physical/data link layers. It notes advantages like being nonproprietary and compatible with all systems, and disadvantages including size and potential speed issues.
presentation on TCP/IP protocols data comunicationsAnyapuPranav
The document provides an overview of the TCP/IP protocol architecture. It discusses the five layers of TCP/IP including the physical, network access, internet, transport, and application layers. It describes the protocols used at each layer, such as IP, TCP, UDP, HTTP, and FTP. The document also discusses how data is encapsulated as it passes through each layer of the TCP/IP model and is transmitted from one host to another across networks and the internet.
This presentation is about a range of computer network that are explained in detail. I recommend you have microsoft powerpoint 2010 or later for smooth running of the presentation. There are also animations in this presentation. Please enjoy, download and follow.
The document discusses computer networks and network protocols. It begins with an introduction to network protocols and the Internet protocols. It then provides definitions and explanations of communication protocols, including addressing, transmission modes, and error detection/recovery techniques. It lists and describes common network protocols like TCP/IP, routing protocols, FTP, SMTP, and more. It also discusses the OSI model layers, TCP/IP protocol suite, data encapsulation, protocol data units, protocol assignments to layers, and addresses at each layer.
The document discusses network terminology and components. It explains that networks require network operating systems and protocols to enable communication between computers. It provides details on the OSI model and how data travels through each layer from application to physical. TCP/IP protocols map to the OSI layers, with TCP and IP operating at the transport and network layers to deliver data between devices on a network.
The document discusses networking concepts such as network topologies, devices, and the OSI model. It begins by explaining how businesses realized networking could increase productivity and save costs. It then describes common networking devices like NICs, hubs, switches, and routers. The document also covers standard network topologies and the layers of the OSI model, providing examples of how data is encapsulated as it travels through each layer.
Port numbers are used to identify protocols and applications using the TCP/IP protocol suite. Some common port numbers and their associated protocols include port 80 for HTTP, port 443 for HTTPS, port 25 for SMTP email, and port 53 for DNS. Port numbers help direct network traffic to the appropriate application or service.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
The document discusses layer 3 switches, which are networking devices that can perform the routing functions of traditional routers but at faster speeds through hardware-based forwarding. Layer 3 switches determine packet forwarding through layer 3 addresses, run routing protocols, and provide benefits like high performance, scalability, and lower latency compared to routers. While layer 3 switches can replace routers for intra-network routing, routers are still needed for connections to wide area networks.
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
The document provides an overview of protocol architectures and the TCP/IP protocol stack. It discusses how protocol architectures establish rules for exchanging data between systems using layered protocols. The TCP/IP model is then explained in detail through its five layers - physical, network access, internet, transport and application - and core protocols like IP, TCP and UDP. Key differences between IPv4 and IPv6 are also summarized.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
ZigBee is a wireless networking technology built on the IEEE 802.15.4 standard designed for low-power devices. It enables reliable, cost-effective networks for applications that require low data rates, long battery life, and secure networking. ZigBee is ideal for remote control and automation applications due to its low power consumption and long battery life. The technology uses small, low-power digital radios based on IEEE 802.15.4 and allows self-healing networks to be formed from transceivers. ZigBee networks are secured with 128-bit AES encryption and can connect thousands of devices together wirelessly.
Ähnlich wie Instantly find and stop attacks with a fully automated platform that simplifies security. Palo Alto has been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row. (20)
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Instantly find and stop attacks with a fully automated platform that simplifies security. Palo Alto has been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row.
5. PHYSICAL LAYER & FUNCTION
• 1st layer of OSI Model
• its consist of hardware and topology
• hardware are wired, wireless and connectors
• Topology - it is logical or physical layout of the network
• Bus,star,mesh,ring topology
• Its send and recives bits on medium
5
Waseem Akram
6. CABLES
• Console cable - it is use to take access of network devices
• Straight cables are primarily used for connecting different devices.
example: pc-sw, sw-router, sw-firewall.
• Crossover cables are use for connecting unlike devices same
devices.
example: pc-pc, sw-sw, router-router, pc-router.
Waseem Akram 6
7. LAYER 1 DEVICES
• layer 1 devices include hubs, repeaters & Ethernet cable connectors. These are the basic
devices that are used at the physical layer to transmit data through a given physical medium
which is suitable as per the network need.
Waseem Akram 7
8. DATA LINK LAYER
• its provides exchanging of data over common local media
• it has two sub layers
• MAC (Media access control) -physical address 48 bits
address expressed in 12 hexa decimal digits
• 1st half MAC address is provided by OUI
• 2nd half MAC address is provided by vendor
manufacuted
8
Waseem Akram
9. • LLC (Logical link control)
• it provide error detection by using FCS & CRC
Mathematical algorithm
• FRAMING
• It converts bits into bytes and bytes into frames and
vise-versa
• at data link layer DATA is called FRAME
9
Waseem Akram
10. What is Address Resolution Protocol (ARP)?
• Address Resolution Protocol (ARP) is a protocol or procedure that connects
an ever-changing Internet Protocol (IP) address to a fixed physical machine
address, also known as a media access control (MAC) address, in a local-
area network (LAN).
• This mapping procedure is important because the lengths of the IP and MAC
addresses differ, and a translation is needed so that the systems can
recognize one another. The most used IP today is IP version 4 (IPv4). An IP
address is 32 bits long. However, MAC addresses are 48 bits long. ARP
translates the 32-bit address to 48 and vice versa.
10
Waseem Akram
11. What Are the Types of ARP?
There are different versions and use cases of ARP. Let us take a look at a few.
Proxy ARP
• Proxy ARP is a technique by which a proxy device on a given network answers the ARP request for an IP address
that is not on that network. The proxy is aware of the location of the traffic's destination and offers its own MAC
address as the destination.
Gratuitous ARP
• Gratuitous ARP is almost like an administrative procedure, carried out as a way for a host on a network to simply
announce or update its IP-to-MAC address. Gratuitous ARP is not prompted by an ARP request to translate an IP
address to a MAC address.
Reverse ARP (RARP)
• Host machines that do not know their own IP address can use the Reverse Address Resolution Protocol (RARP) for
discovery.
Inverse ARP (IARP)
• Whereas ARP uses an IP address to find a MAC address, IARP uses a MAC address to find an IP address.
11
Waseem Akram
13. ENCAPSULATION & DECAPSULATION
• ENCAPSULATION - The process of adding extra-
information or exta
headers and trailer
• DECAPSULATION - The process of removing extra-
information or removing exta headers and trailer
13
Waseem Akram
15. LAYER 2 DEVICES
• A layer 2 network device is a multiport device that uses hardware addresses, MAC address, to process
and forward data at the data link layer (layer 2). A switch operating as a network bridge may
interconnect otherwise separate layer 2 networks. The bridge learns the MAC address of each
connected device.
Waseem Akram 15
16. NETWORK LAYER
• Handles the routing and sending of data between different
networks. The most important protocols at this layer are
IP and ICMP.
• IP ADDRESSING
• ROUTING
• PATH DETERMINATION
16
Waseem Akram
17. IP ADDRESSING
• This enables us to determine what is source ip and
destination ip
• it is a logical address which enables a machine to
comminicate with another.
17
Waseem Akram
18. ROUTING & Path Determination
• The process of transfering of packet from one network
to another network on the basis of destination ip
address
• The process of selecting best path
18
Waseem Akram
19. IP HEADER - (ip address is 32 bits)
19
Waseem Akram
20. What is ICMP (Internet Control Message Protocol)?
• ICMP is a network level protocol. ICMP messages communicate information about network
connectivity issues back to the source of the compromised transmission. It sends control
messages such as destination network unreachable, source route failed, and source quench.
It uses a data packet structure with an 8-byte header and variable-size data section.
ICMP and Ping
Ping is a process which uses ICMP messages to report back information on network
connectivity and the speed of data relay between a host and a destination computer. It's one of
the few instances where a user can interact directly with ICMP, which typically only functions to
allow networked computers to communicate with one another automatically.
PING is the Packet InterNet Groper.
20
Waseem Akram
21. LAYER 3 DEVICES
• The layer 3 in the OSI model is the network layer. The device that comes under this layer is
the router. The functions include address handling,logical address and names to physical
address translation ,routing and traffic management.
Waseem Akram 21
22. TRANSPORT LAYER
• It provide end-to- end connective between two devices,
so that they can send and receive data
• it has two types of protocol
• connection oriented protocol
• connectionless protocol
22
Waseem Akram
23. CONNECTION ORIENTED
• It provide guarantee of data transfer from one device to
another device
• It is reliable protocol
• Example - TCP (TRANSMISSION CONTROL
PROTOCOL)
23
Waseem Akram
24. CONNECTIONLESS PROTOCOL
• It doesn't provide guarantee of data transfer from one
device to another device
• It is unreliable protocol
• Example - UDP (USER DATAGRAM PROTOCOL)
24
Waseem Akram
27. PORT NUMBER
• Both TCP and UDP use port number
• it use to pass the information to the upper layer
• INTERNET ASSIGNED NUMBER AUTHORITY (IANA) Assigns port
numbers
27
Waseem Akram
28. UDP WORKING
• No connection establishment in case of UDP
28
Waseem Akram
30. ERROR RECOVERY & WINDOWING
• TCP USE Sequence and Acknowledgement number For
error recovery
• Windowing size mean how many bytes of data that can
sent with accepting acknowledge from receiver
30
Waseem Akram
31. TCP VS UDP
TCP (Transmission Control Protocol) UDP (User Datagram Protocol)
TCP is a connection oriented protocol. UDP is a connection less protocol.
TCP rearranges data packets in the order
specified.
UDP has no inherent order as all packets are
independent of each other. If ordering is required,
it has to be managed by the application layer.
The speed for TCP is slower than UDP. UDP is faster because error recovery is not
attempted. It is a "best effort" protoco
TCP header size is 20 bytes UDP Header size is 8 bytes.
31
Waseem Akram
32. SESSION LAYER
• The session layer (layer 5) is responsible for establishing,
managing, synchronizing and terminating sessions
between end-user application processes.
32
Waseem Akram
33. PRESENTARION LAYER
• This layer converts the the data in the form that it can
be accept by the application
• The data from the application layer is extracted here
and manipulated as per the required format to transmit
over the network.
33
Waseem Akram
34. APPLICATION LAYER
• Application layer which is implemented by the network
applications. These applications produce the data, which
has to be transferred over the network. This layer also
serves as a window for the application services to access
the network and for displaying the received information to
the user. Ex:
• Application – Browsers, Skype Messenger etc.
34
Waseem Akram