Stay Connected

Tuesday, 30 July 2013

How to build up a VPN Server on Your Windows OS Without Any third party Software...

Windows gives the inbuilt ability to function as VPN server, although this option is invisible. It's exploits on both Windows 7 & 8. The server uses the point-to-point tunneling protocol (PPTP.)

This could be helpful for connecting to your home network with public network, playing LAN games with someone, or securing your network on a open Wi-Fi connection – a hardly of the many reasons you might need to apply a VPN.

Boundaries:

While this is a exciting feature, it may not be the ideal path to grant VPN connections to your local network. It has several boundaries:


  • You'll require the ability of forward ports from your router.
  • You've to uncover Windows and a port for the PPTP VPN server straight to the Internet, which isn't idealistic from a protection point of view. You had better apply a strong password and consider utilise a port that Is not the default port.
  • This Is not as simple to build up and use as software suchlike LogMeIn Hamachi and TeamViewer. Almost people will likely be better away with a additional complete software package similar those two.

Creating a VPN Server:

First gear, you have to goto the Network Connections windowpane. The smart direction to open it is to press the Windows key, type "ncpa.cpl", and hit Enter.



Now. Press the Alt key & click on the File menu that appears, and click on New Incoming Connection.


Now, select the user accounts that can connect remotely. To gain protection, you may prefer to create a fresh, restricted user account instead of allow VPN logins from your primary user account. (Click on Add someone to create a new user account). Check the user you allow has a very potent password, because a weak password could be cracked by a dictionary attack.


Do check mark on  the "Through the Internet" option to permit VPN connections over the Internet. You'll be also able to permit incoming connections over a dial-up modem, if you've a dial-up hardware.


and then pick out the networking protocols that should be enabled for incoming connections. E.g., if you don’t want that connected people have access to shared files and printers on your local network, you can uncheck the File and Printer Sharing option.


Now Click the Allow access button and Windows will set up a VPN server.


If you desire to disable the VPN server in future, you can delete the Incoming Connections item from your Network Connections windowpane.


Router Setup:

You'll now require to login @ your router’s setup page and forward port 1723 to the IP address of the computer where you set up the VPN server.

For supreme protection, you've to create a port forwarding rule that forwards random “external port” – such as 23243 – to “internal port” 1723 on your computer. This will allow you to join to the VPN server using port 23243, and will protect you from malicious programs which can scan and attempt to connect automatically to VPN servers working on the default port.

You can also consider firewall to only allow incoming connections from specific IP addresses.

Connecting to VPN Server:

Use the Connect to a network option in your Windows and enter your computer’s public IP address. Type the username and password you created to log in.

click Next and that's it.

Friday, 28 June 2013

5. Networking Hardware

Networking hardware admits totally computers, peripherals, interface cards and additional equipments required to execute data-processing and communications inside the network.


Network Components:

1.Network(file) Server
2.Workstation
3.NIC (Network Interface Card)
4.Switches
5.Repeaters
6.Bridges
7.Routers
8.Firewalls


1.Network(file) Server:

Single or more than network servers are part of nearly all LAN. These are really speedy computers with a massive amount of RAM and storage space, with a single or many fast network interface card(s). The network OS allows tools to share server resources and data with network users. A advanced permissions-handling system is included, so that approach to sensible data can be cautiously tailored to the motives of the users. For small networks, a singe network server might allow access control, file-sharing, printer-sharing, e-mail, database, and other services.

The network server can be respond to requests of many network users simultaneously. E.g., it may be ask to load a word processor program to one workstation, obtain a database file from another workstation, and put in an e-mail message on the same period of time. This needs a computer that can store and rapidly share heavy amounts of info. When configuring such a server, budget is generally the dominant factor. The following guideposts should be observed:
  • Fastest Processor(s)
  • Largest Amount of RAM
  • multiple large storage, fast(RPM) hard drives
  • Extra expansion slots ( for extra cards)
  • Fastest network interface card(s)
  • A RAID (Redundant Array of Inexpensive Disks) to preserve data(if even disk failure occurs)
  • A back-up unit (i.e. DAT tape drive, Removable HDD, or CD/DVD/Blu-Ray burner)

2.Workstation:

Computers that humankind uses are broadly speaking  as workstations. A regular workstation is a computer that's configured with a NIC, networking software, and the N/w cables. Workstations don't needs heavy storage hard drives, as data (files) can be saved on the file server. Nearly any computer can process as a network workstation.

3.NIC (Network Interface Card):

The network interface card (NIC) allows the physical connection 'tween the network and the computer workstation. Almost NICs are internal, and it's included in the purchase of almost computers. NICs are a major element in determining the speed and operation of a network. It's a effective idea to use the fastest network card for the type of workstation you're using.
The most basic n/w interface connections are Ethernet cards and wireless adaptors.

4.Switches:

An ethernet switch is a device that offers a central connection stage for cables from workstations, servers, and peripherals. In a star topology, twisted pair cable is carry from each workstation to a central switch/hub. Almost switches are active, means they electrically amplify the signals as it goes from one device to another. The pre-existing of the switch was the hub, which broadcasts all inbound packets to out all ports of the device and making large amounts of unnecessary network traffic. Advanced switches build a port map(table) of all IP address which responds on each port, and only broadcasts on all ports while it does not have a packet's aim IP already in it's port map.

5.Repeaters:

Because a signal loses intensity as it passes along a cable, it's frequently essential to hike the signal with a device known as a repeater. The repeater electrically amplifies the signals it receives and re-broadcast it. Repeaters can be individual device or they can be integrated into a concentrator. It's used when the overall distance of your network cable passes the setted standards for the perticular type of cable being used.

A good example of the use of repeaters would be in a LAN applying a star topology with unshielded(naked) twisted-pair cabling. The distance limitation for un-shielded twisted-pair cable is 100 meters. The most basic configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator reconstructs all the signals that pass through it providing the overall length of cable on the network to exceed the 100 meter limitation.

6.Bridges:

Bridge is a device that renders you to section a bigger network into 2 smaller, further effectual networks. If you're supplying to an older cabling scheme and desire the fresh network to be up-to-date, a bridge can connect the two.

A bridge monitors the data traffic along both sides of the network so that it can pass packages of info to the accurate location. Most bridges "listen" to the network and automatically solve the address of each node on both sides of the bridge. The bridge can audit every message and, if requisite, broadcast it on the other side of the network.

The bridge controls the traffic to observe optimum functioning on both sides of the network. You may say that the bridge is like a traffic cop at a busy intersection on rushed time. It holds information running on both roots of the network, but it doesn't grant unneeded traffic through. Bridges can be utilized to link up dissimilar types of cabling, or physical topologies. It must be used 'tween networks with the similar protocol.

7.Routers:

Routers are the traffic managers of the worldwide internet. All routers maintain composite routing tables which grant it to decide suitable routes for packets destination for any address. Routers communicate with each other, and forwards packets out of or into a network.

While bridge knows the address of every last computers on each side of network, Router knows the address of other router which in turn recognise about their own networks. Routers can even "listen" to entire network to decide which divisions are busiest -- and then they can redirect information around those divisions until traffic over-crowding clears.

So, routers are network gate-ways, that travel packets from one network to another, and several can exchange from one network protocol to another as requisite. Router selects the best path to route a content, grounded on the destination address of the packet. The router can lead traffic to forbid frontal collisions, and is smart decent to acknowledge when to direct traffic along back routes and shortcuts.

8.Firewalls:

A firewall is a networking device which is set up at the entrance to a local area network when connected a networks together, specially when joining a private network to a public network, specified the internet. The firewall applies rules to filter traffic into and out of the private n/w, to protect the private n/w users and information from malicious hackers.

Firewall is either hardware or software, depending upon intended use. A firewall used to protect a network is a hardware device it should be set up in the network 'tween the router and the network. About all hardware firewall have at least 2 ports, tagged "Trusted" and "Untrusted". These terms involve the real nature of the firewall's duty to the private n/w. The public n/w is connected to the untrusted port, and the private n/w is connected to the trusted port.

Firewall regulations are usually simple, comprising of a verb, either permit or deny, the direction of the hits, either in-bound or out-bound, and an address or other n/w traffic identifier. Firewall rules are cumulative, so common rules might be defined, and exceptions added as requisite.

Software firewall is usually included in advanced workstation and server OS. it operates in a same way as hardware firewalls, except that filters traffic in and out of the machine itself. This software firewall is usually ignored by users, and only take attention occasionslly when an internet-connected application program do not process as expected. The software firewall should ever be viewed a "suspect" in such cases. The problem easily resolved, by fixing an exception rule in the firewall for the software that's trying to communicate.

                                                               ########################

Wednesday, 26 June 2013

4. Cabling Overview

Twisted-Pair Cabling:

A regular twisted-pair cable consists of 4 pairs of copper wires, total of 8 wires. Each side of the cable is ended applying an RJ45 connector, RJ45 consists eight pins. When the connector is crimped to the cable, these pins make contact with each wire separately and it's necessary.

The wires comes with assigned color code to distinguish them and color code is dictated by the cabling standard - TIA/EIA-568B:

Color
Pin#
White-Orange
1
Orange
   2
White-Green
   3
Blue
   4
White-Blue
   5
Green
   6
White-Brown
7
Brown
   8

Each wire allotted for specific purpose. E.g., both Ethernet and Fast Ethernet uses 2 wires to transmit data , and 2 wires to receive data, while rest 4 wires remains inactive.

For communication to take place, transmit pins must connect to the receive pins of the remote host. This doesn't happen in a straight-through cabling configuration:

The crossover controlled either by the cable, or an intermediator device, such as a  switch.

Twisted-Pair Cabling - Cable and Interface Types:

The layout  of the wires in the RJ45 connector orders the routine of the cable. There are 3 types of twisted-pair cable:
Straight-through
Crossover
Rollover

The network interface type decides when to use each cable:
Medium Dependent Interface with Crossover (MDIX)

Medium Dependent Interface (MDI)

Host interfaces are usually MDI, when hub or switch interfaces are usually MDIX.

Twisted-Pair Cabling - Straight-Through Cable:

A straight-through cable is applied in the following conditions:
From a host to a hub - MDI to MDIX
From a host to a switch - MDI to MDIX
From a router to a hub - MDI to MDIX
From a router to a switch - MDI to MDIX

Basically, a straight-through cable is used to connect any host device to a hub or switch, exclude for another hub or switch. The hub or switch supplies the crossover (or MDIX) function to link transmit pins to receive pins.

TIA/EIA-568B standard for a straight-through cable:
Pin#  Connector 1                                                   Connector 2         Pin#

1       White Orange     ------------------------   White Orange              1

2       Orange                 ------------------------   Orange                           2

3       White Green        ------------------------   White Green                3

4       Blue                        ------------------------   Blue                              4

5       White Blue           ------------------------   White Blue                   5

6       Green                     ------------------------   Green                           6

7       White Brown      ------------------------   White Brown               7

8       Brown                   ------------------------   Brown                           8

A straight-through cable also known as a patch cable/cord.

Twisted-Pair  – Crossover Cable:

A cross-over cable is applied in the following conditions:
• From same device to same device,
 Like: • host to a host – MDI to MDI
         • hub to a hub - MDIX to MDIX
         • switch to a switch - MDIX to MDIX
         • hub to a switch - MDIX to MDIX
         • router to a router - MDI to MDI

To make a cross-over cable, the transmit pins must be swapped with the
receive pins at one end of the cable:
•  1 & 3
•  2 & 6

Pin#  Connector 1                                                   Connector 2         Pin#

1       White Orange     ------------------------   White Green                 1

2       Orange                 ------------------------   Green                              2

3       White Green        ------------------------  White Orange                3

4       Blue                        ------------------------   Blue                               4

5       White Blue           ------------------------   White Blue                   5

6       Green                     ------------------------  Orange                          6

7       White Brown      ------------------------   White Brown               7

8       Brown                   ------------------------   Brown                           8

Make sure that the Orange and Green pins swapped on Connector 2.
The first connector standard is the TIA/EIA-568B, while the second
connector standard is the TIA/EIA-568A.

Twisted Pair – Rollover Cable:

A rollover cable is applied to link a workstation or laptop into a Cisco
device’s console or auxiliary port, for management functions. A rollover
cable is also known console cable, and its overlay is usually flat
and light-blue in colour.
To make a rollover cable, the pins are totally reversed on one end of the
cable:

Pin#  Connector 1                                                   Connector 2         Pin#

1       White Orange     ------------------------  Brown                               1

2       Orange                 ------------------------   White Brown                  2

3       White Green        ------------------------  Green                                3

4       Blue                        ------------------------ White Blue                       4

5       White Blue           ------------------------  Blue                                  5

6       Green                     ------------------------ White Green                    6

7       White Brown      ------------------------   Orange                             7

8       Brown                   ------------------------  White Orange                 8


It's used to configure Cisco's Router, Switches, and Firewalls.

                                 *********************************

3. Ethernet Technologies

What is Ethernet?

Ethernet is a category of technologies that allows data-link and physical specs for controlling access to a shared network medium. It's came out as the superior technology utilized in LAN networking.

Ethernet was primitively built up by Xerox in the 1970s, and functioned at 2.94Mbps. The technology was standardised as Ethernet Ver. 1 by a consortium of 3 companies - DEC, Intel, and Xerox, conjointly looked up as DIX - and further rectify as Ethernet 2 in 1982.

In the midst 1980s, the Institute of Electrical and Electronic Engineers (IEEE) released a regular standard for Ethernet, defined as IEEE 802.3 standard. The first 802.3 Ethernet operated at 10Mbps, and with success supplanted competitive LAN technologies, such as Token Ring.

Ethernet gives various benefits o'er different LAN technologies:
Easy to install and manage
Affordable
Flexible and scalable
User-friendly to interoperate 'tween vendors


Types of Ethernet Cabling:

Ethernet can be deployed o'er 3 types of cabling:
Coaxial cabling - most entirely deprecated in Ethernet networking
Twisted-pair cabling
Fiber-optic cabling

Coaxial cable, much abbreviated as coax cable, dwells of a separate wire surrounded by insulant, a metal shield, and a plastic sheath. The shield protects against electromagnetic interference (EMI), which can reason attenuation, a decrease of the durability and quality of signal. EMI can be fathered by a form of sources, such as florescent light ballasts, microwaves, cellular phone, and radio transmitters.

Coax is usually used to deploy cable TV to homes and occupations.

2 types of coax used Mostly in Ethernet N/W:
Thicknet
Thinnet

Thicknet has a broader diameter and a lot shielding, which bears larger lengths. Even so, it's less flexible than smaller thinnet, and then additional difficult to work on. A vampire tap is utilized to physically tie devices to thicknet, while a BNC connector is utilised for thinnet.

Twisted-pair cable consists of 2 or 4 pairs of copper cables in a plastic sheath. Cables in a pair twist round to each other to cut crosstalk, a form of EMI that happens when the signal from one cable bleeds or interferes with signal on different cable. Twisted-pair is very common Ethernet cable.

There is various categories of twisted-pair cable, identified by the number of twists per inch of the copper pairs:
Cat3 - three twists / inch.
Cat5 - five twists / inch.
Cat5e - five twists / inch;
Cat6 - six twists / inch, with improved insulation.

RJ45 connector is used to link up a device to a twisted-pair cable. The layout of the wires in the connector dictates the function of the cable.

While coax and twisted-pair cabling carry electronic signals, fiber optics uses light to transmit a signal. Ethernet supports two fiber specifications:

Singlemode fiber - consists of a very small-scale glass core, granting just a single beam or ray of light to move across it. This greatly cuts the attenuation and dispersion of the light signal, supportive higher bandwidth o'er very far spaces, often measured in kilometres.

Multimode fiber - consists of a large core, granting multi modes of light to pass over it. Multimode gets greater distribution than singlemode, resultant in smaller supported spaces.

Network Topologies

A topology means both the physical and logical structure of a network. there is some types of topologies , including:

Bus 
Star 
Ring 
Full or partial mesh

All of them Star topology is well known and most practical in field.

                                                    *********************************

Friday, 14 June 2013

2 - OSI Reference Model


A computer network connects 2 or many devices to share data and services. Multiple N/Ws connected together from an inter-network.

Inter-networking deliver challenges - inter operating between products of various manufacturers demands consistent standards. Network reference models were prepared to deal these disputes. A network reference model functions as a blueprint, detailing how communication between network devices should happen.

The 2 most acknowledged network reference models are:
•    Open Systems Interconnection (OSI) model
•    Department of Defense (DoD) model

Without the framework that network models furnish, all network hardware and software would undergo proprietary. Organizations would have got shut up into a individual vendor’s equipment, and worldwide networks suchlike the Internet would have been impractical, if not impossible.

Network models are formed into layers, on each layer standing for a specific networking function. These functions are operated by protocols, which are rules(formulas)  that regulate end-to-end communication 'tween devices.

The TCP/IP suite is the most current protocol suite, and is the base of the Internet.

A network model is not a physical entity - there's none OSI device, It's logical. Manufacturers don't all of the time purely stick to a reference model’s design, and so not every communications protocol meets absolutely inside a individual layer. A few protocols can perform over multiple layers.


OSI Model:

The Open Systems Interconnection (OSI) model was developed by the International Organization for Standardization (ISO), and formalized in 1984. It's provided the first model regulating how data should be directed across a network.

The OSI model consists of 7 layers, from each one related to a particular network role:


7    Application
6    Presentation
5    Session
4    Transport
3    Network
2    Data-link
1    Physical

Take note that the bottom layer is Layer 1. Varied mnemonics get more at ease to remember the ordering of the OSI model’s layers:
7    Application     -     Advise
6    Presentation    -     Person's
5    Session            -    Sales
4    Transport         -    Trust
3    Network          -    Not         
2    Data-link         -    Do
1    Physical          -    Please  
          
International Organization for Standardization additional built up an entire protocol suite grounded on the OSI model; however, the OSI communications protocol suite was ne'er widely applied.

The OSI model itself is now slightly deprecated - current communications protocol suites, such as the TCP/IP suite, is awkward to match cleanly within the OSI model’s 7 layers. This is specially truthful of the upper three layers.

The bottommost (or lower) 4 layers are more clear specified, and terminology from those layers is even prevalently utilized. A lot protocols and devices are represented by which bottom layer they function at.

OSI Model - The Upper (top) Layers

The top three layers of the OSI model are frequently referred as upper layers:
•    Layer 7 - Application layer
•    Layer 6 - Presentation layer
•    Layer 5 - Session layer

Protocols that function at these layers handle application-level roles, and are usually applied in software package.

The role of the upper layers of the OSI model may be tough to figure. Upper layer protocols don't e'er go perfectly within a layer, and oftentimes run over multiple layers.


Layer 7 - The Application Layer:

The Application layer (Layer-7) allows the interface 'tween the user applications programme and the network. A web browser and an e-mail client are good example of user applications programme.

The user applications programme itself doesn't dwell at the Application layer - the protocol does. The user interacts on the applications programme, which in turn interacts with the application protocol.

Cases of Application layer protocols includes:
•    Telnet
•    POP3 and SMTP, via an email clientHTTP, via a web browser

•    HTTP, via a web browser

•    FTP, via an FTP client

The Application layer supplies a kind of functions:
•    Determines resource availability
•    Synchronizes communication
•    Discovers communication partners

The Application layer interacts with the Presentation layer at a lower place it. As it's the uppermost layer,there is no layer to upper it for interacts.

In addition, the Presentation layer can execute encryption and compression of data, as requisite. Still, these functions can also be executed at lower layers also. E.g., the Network layer can execute encryption, applying IPSec.


Layer 6- The Presentation Layer:

The Presentation layer (Layer-6) verifies the format and syntax of user data for the application layer. This assures that information from the transmitting application can be understood by the receiving applications programme.

Criteria have been built up for the format of information cases, specified text, images, audio, & video. Examples of Presentation layer formats includes:
•    Text - RTF, ASCII, EBCDIC
•    Images - GIF, JPEG, TIF,bmp

•    Audio - MIDI, MP3, WAV,m4a
•    video - MPEG, AVI, MOV,Mp4,3gp,mkv

If two devices don't support the equal format or syntax, the Presentation layer can render conversion or translation services to ease communication.

In addition, the Presentation layer can execute encryption and compression of data, as requisite. Still, these functions can also be executed at lower layers also. E.g., the Network layer can execute encryption, applying IPSec.



Layer 5 - The Session Layer:

The Session layer (Layer-5) is responsible for establishing, maintaining, and at long last terminating sessions 'tween devices. If a session is cracked, this layer can attempt to retrieve the session.

Sessions communication drops under one of 3 classes:
•    Simplex - one way communication
•    Half-Duplex - two-way communication, but not simultaneous (same time)
•    Full-Duplex - simultaneous two-way communication

Several advanced protocol suites, such as transmission control protocol/internet protocol(tcp/ip) , don't carry out Session layer protocols. Connection direction is frequently held by lower layers, such as the Transport layer.

The lack of actual Session layer protocols can deliver challenges for high-availability and failover. Trust on lower-layer protocols for session management provides less flexibility than a strict adhesiveness to the OSI model.



OSI Model - The Lower Layers:

The bottom 4 layers of the OSI model are very much adverted to as the lower layers:


•    Layer 4 - Transport layer
•    Layer 3 - Network layer
•    Layer 2 - Data-Link layer
•    Layer 1 - Physical layer

Protocols that functions at these layers insure the end-to-end transportation of data 'tween devices, and are enforced in both software and hardware.


Layer 4 - The Transport Layer

The Transport layer (Layer-4) doesn't really transmit data, contempt its name. Rather, this layer is liable for the trustworthy transfer of data, by assuring that data reaches its destination error-free and in order.

Transport layer communication comes below two classes:
•    Connectionless - needs no connection prior to data is sent.

•    Connection-oriented - needs that a connection with particular agreed-upon parameters be accomplished prior to data is sent.


Connection-oriented protocols put up various crucial services:

•    Segmentation and sequencing - data is segmented into smaller parts for transport. Each segment is allotted a chronological sequence number, so that the receiving host can reassemble the data on arrival.

•    Connection establishment - connections are established, maintained, and finally dismissed between devices.

•    Acknowledgments - receipt of data is affirmed through the use of acknowledgments. Otherwise, data is retransmitted, assuring delivery.

•    Flow control (or windowing) - data transfer rate is managed to prevent congestion.

The TCP/IP protocol suite integrates 2 Transport layer protocols:
•    User Datagram Protocol (UDP) - connectionless
•    Transmission Control Protocol (TCP) - connection-oriented 



Layer 3 - The Network Layer:

The Network layer (Layer-3) holds inter-network communication, and has 2 key duties:

•    Logical addressing - grants a unique address that describes both the host, and the network that host connected.

•    Routing - finds out the best path to a specific address network, and then routes data consequently.

2 of the basic Network layer protocols are:
•    Novell’s Internetwork Packet Exchange (IPX).

•    Internet Protocol (IP).

IPX is about entirely deprecated. IP version 4 (IPv4) and IP version 6 (IPv6) are covered in nauseating point in different guides.



Layer 2- The Data-Link Layer:

When the Network layer is occupied with transmitting data 'tween networks, the Data-Link layer (Layer-2) is liable for transmitting data within a network.

The Data-Link layer comprises of two sublayers:
•    Media Access Control (MAC) sublayer 
•    Logical Link Control (LLC) sublayer

The MAC sublayer holds access to the physical medium, helping as mediator if multiple devices are contending for the similar physical link. Data-link layer technology have varied techniques of achieving this -

Ethernet applies Carrier Sense Multiple Access with Collision Detection (CSMA/CD), and Token Ring uses a token.

Ethernet is covered up in large detail in other guides.

The LLC sublayer functions as the intermediator 'tween the physical link and each higher layer protocols. It checks that protocols suchlike IP can operate irrespective of what type of physical technology is being utilized.

In addition, the LLC sublayer can execute flow-control and error-checking, though such roles are often supplied by Transport layer protocols, such as TCP.


The Data-link layer bundles the higher-layer data into frames, and then the data can be place onto the physical wire. This packaging method is named to as framing or encapsulation.

The encapsulation type will change depending upon the fundamental technology. Usual Data-link layer technology admit following:
•    Ethernet - almost common LAN data-link technology

•    Token Ring - most entirely deprecated

•    802.11 Wireless )
•    Frame-Relay

•    ATM (Asynchronous Transfer Mode)
•    FDDI (Fiber Distributed Data Interface)

The data-link frame contains the source and destination physical (or hardware) address. Physical addresses uniquely describe a host inside a network, and are much hardcoded onto physical network interfaces. However, hardware addresses contain no mechanism for differentiating one network from another, and can only identify a host within a network.

The most familiar Physical address is the Ethernet MAC address.



Layer 1 - The Physical Layer:

The Physical layer (Layer-1) commands the signal and transmitting of raw bits onto the physical medium. The Physical layer is nearly related to the Data-link layer, as some technologies (such as Ethernet) contains both data-link and physical functions.

The Physical layer puts up specs for a kind of hardware:
•    Connectors and transceivers
•    Cables
•    Hubs
•    Wireless radios
•    Network interface cards (NICs)


Layered Communication & Encapsulation:
As data is travelled from the user application down the virtual layers of the OSI model, all of the lower layers binds a header (and occasionally a trailer) containing protocol data specified to that layer. These headers are known as Protocol Data Units (PDUs), and the operation of adding these headers is known as encapsulation.

E.g., a Transport layer protocol specified as TCP will add a header carrying flow control and sequencing info. The Network layer header holds logical addressing info, and the Data-link header holds physical addressing and extra hardware precise info.



The PDU of each layer is described with a assorted terms:

Layer                             PDU Name   
       
Application      -   
Presentation     -   
Session            -   
Transport         -              Segments   
Network          -              Packets   
Data-Link        -             Frames   
Physical           -             Bits   






All layers transmits with the related layer on the receiving device. E.g., With the sending device, source and destination hardware directing is ordered in a Data-link header. On the receiving device, that Data-link header is processed and stripped away before being sent out  to the Network and other upper layers.

Network devices are usually identified by the OSI layer they function at; or, further specifically, what header or PDU the device works.

E.g., switches are mostly described as Layer-2 devices, as switches process data stored in the Data-Link header of a frame, like Ethernet MAC addresses. Likewise, routers are known as Layer-3 devices, as routers process logical addressing information @ the Network header of a packet, such as IPs.

OSI Reference Model Example:

A web browser processes as a good practicable example of the OSI model and the TCP/IP protocol suite:

•    Τhe web browser assists as the user interface for accessing a internet site. The web browser itself doesn't run at the Application layer. Rather, the web browser appeals the Hyper Text Transfer Protocol (HTTP) to interface with the remote web server, that's why http:// precedes every web address.

•    The Internet can provide information in a large kind of formats, a role of the Presentation layer. Usual formats on the Internet includes HTML, XML, PHP, GIF, and JPEG. Some encryption or compression mechanisms applied on a internet site are likewise counted a Presentation layer role.

•    The Session layer is liable for building, maintaining, and ending the session 'tween devices, and deciding whether the communication is full-duplex or half-duplex. Even so, the TCP/IP stack doesn't admit session-layer protocols, and is dependent on lower-layer protocols to execute these roles.

•    Hypertext transfer protocol utilizes the Transport layer protocol to secure the authentic delivery of data. TCP builds and holds a connection from the client to the net server, and bundles the higher-layer data into segments. A sequence amount is assigned to each segment so that data can be reassembled after arrival.

•    The finest path to route the data 'tween the client and the web server is decided by IP, a Network layer protocol. IP is as well responsible for the assigned logical addresses on the client and server, and for encapsulate segments into packets.

•    Data can't be sent direct to a logical address. Because packets go from network to network, IP addresses are translated to hardware addresses, which is a role of the Data-Link layer. The packets are encapsulated into frames to be placed upon the physical medium.

The data is ultimately transported onto the network medium at the Physical layer, in the kind of raw bits. Signaling and encoding mechanisms are settled at this layer.

IP and the DoD Model:

The Internet Protocol (IP) was primitively formulated by the Department of Defense (DoD), and was a foundation for a group of communications protocol that got familiar as the TCP/IP protocol suite.

TCP/IP consists 4 layers:

4.Application Layer
3.Host-to-Host Layer
2.Internet
1.Network Access

The following table exemplifies where primary protocols meet into the TCP/IP model:


Layer
Example Protocols


Application
FTP, HTTP, SMTP
Host-to-Host
TCP, UDP
Internet
IP
Network Access
Ethernet


In spite of the DoD model, the OSI model is still the base for most network terminology practically.

So Please Leave smoking, IT KILLS... ☺