starclick

Tuesday, 11 November 2014

7-layer OSI MODEL

The OSI (Open System Interconnection) model is developed by ISO in 1984 to provide a reference model for the
complex aspects related to network communication. It divides the different functions and services provided by network technology in 7 layers. This facilitates modular engineering, simplifies teaching and learning network technologies, helps to isolate problems, and allows vendors to focus on just the layer(s) in which their hardware or software is implemented and enables them to create products that are compatible, standardized, and interoperable.

The diagram below shows the 7 layers of the OSI Model. To remember them in the correct order, a common mnemonic is often used: All People Seem To Need Data Processing.



Host A   Host B

The Application, Presentation and Session layers are known as the Upper Layers and are implemented in software. The Transport and Network layer are mainly concerned with protocols for delivery and routing of packets and are implemented in software as well. The Data Link is implemented in hard- and software and the Physical layer is implemented in hardware only, hence its name. These lower two layers define LAN and WAN specifications. A more detailed description of each layer follows below, but here's what basically happens when data passes from Host A to Host B:

  1. the Application, Presentation and Session layer take user input and converts it into data,
  2. the Transport layer adds a segment header converting the data into segments,
  3. the Network layer adds a network header and converts the segments into packets / datagrams,
  4. the Data Link layer adds a frame header converting the packets/datagrams into frames,
  5. the MAC sublayer converts the frames into a bits, which the Physical layer can put on the wire.

The steps are known as the 5 steps of data encapsulation. When the bits stream arrives at the destination, the Physical layer takes it of the wire and converts it into frames, each layer will remove their corresponding header while the data flows up the OSI model until it is converted back to data and presented to the user. This is also known as decapsulation.


APPLICATION (LAYER 7)

The Application layer provides network services directly to the user's application such as a web browser or email client. This layer is said to be "closest to the user". Protocols that operate on this layer include TELNET, HTTP, FTP, TFTP, SMTP, and NTP.


PRESENTATION (LAYER 6)

The Presentation layer 'represents' the data in a particular format to the Application layer. It defines encryption, compression, conversion and other coding functions. Examples of specifications defined at this layer are GIF, JPEG, MPEG, MIME, and ASCII.


SESSION (LAYER 5)

The Session layer establishes, maintains, and terminates end-to-end connections (sessions) between two applications on two network nodes. It controls the dialogue between the source and destination node, which node can send when and for how long. It also provides error reporting for the Application, Presentation and Session layer. Examples of protocols/API's that operate on this layer are RPC and NETBIOS.


TRANSPORT
(LAYER 4)

The Transport layer converts the data received from the upper layers into segments and prepares them for transport. The Transport layer is responsible for end-to-end (source-to-destination) delivery of entire messages. It allows data to be transferred reliably and uses sequencing to guarantee that it will be delivered in the same order that it was sent. It also provides services such as error checking and flow control (in software). Examples of protocols that operate on this layer are TCP, UDP, NETBEUI, and SPX.

The above Transport layer protocols are either connectionless or connection-oriented:

Connection-oriented means that a connection (a virtual link) must be established before any actual data can be exchanged. This guarantees that data will arrive, and in the same order as it was sent. It guarantees delivery by sending acknowledgements back to the source when messages are received. TCP is an example of a connection-oriented transport protocol.

A common example of connection-oriented communication is a telephone call. You call, the 'destination' picks up the phone and acknowledges, and you start talking (sending data). When a message or a piece of it doesn't arrive, you say: "What!?" and the sender will repeat what he said (retransmit the data).

Connectionless is the opposite of connection-oriented; the sender does not establish a connection before it sends data, it just sends it without guaranteeing delivery. UDP is an example of a connectionless transport protocol.


NETWORK (LAYER 3)

The Network layer converts the segments from the Transport layer into packets (or datagrams) and is responsible for path determination, routing , and the delivery of packets across internetworks. The network layer treats these packets independently, without recognizing any relationship between those individual packets. It relies on higher layers for reliable delivery and sequencing.

The Network layer is also responsible for logical addressing (also known as network addressing or Layer 3 addressing) for example IP addressing. Examples of protocols defined at this layer are IP, IPX, ICMP, RIP, OSPF, and BGP. Examples of devices that operate on this layer are layer-3 switches and routers. The latter includes WAPs with built-in routing capabilities (wireless access routers).



DATA LINK (LAYER 2)

The Data Links provides transparent network services to the Network layer so the Network layer can be ignorant about the underlying physical network topology. It is responsible for reassembling bits, taken of the wire by the Physical layer, to frames, and makes sure they are in the correct order and requests retransmission of frames in case an error occurs. It provides error checking by adding a CRC to the frame, and flow control. Examples of devices that operate on this layer are switches, bridges, WAPs, and NICs.

IEEE 802 Data Link sub layers

Around the same time the OSI model was developed, the IEEE developed the 802-standards such as 802.5 Token Ring and 802.11 for wireless networks. Both organizations exchanged information during the development, which resulted in two compatible standards. The IEEE 802 standards define physical network components such as cabling and network interfaces, and correspond to the Data Link and/or Physical layer of the OSI model. The IEEE refined the standards and divided the Data Link layer into two sublayers: the LLC and the MAC sublayer.

- LLC sublayer

LLC is short for Logical Link Control. The LLC layer is the upper sublayer of the Data Link layer and is defined in the IEEE 802.2 standard. LLC masks the underlying physical network technologies by hiding their differences to provide a single interface to the Network layer. The LLC sublayer uses Source Service Access Points (SSAPs) and Destination Service Access Points (DSAPs) to help the lower layers communicate with the Network layer protocols, acting as an intermediate between the different network protocols (IPX, TCP/IP, etc.) and the different network technologies (Ethernet, Token Ring, etc.). Additionally, this layer is responsible for sequencing and acknowledgements of individual frames.

- MAC sublayer

The Media Access Control layer takes care of physical addressing and allows upper layers access to the physical media, handles frame addressing, error checking. This layer controls and communicates directly with the physical network media through the network interface card. It converts the frames into bits to pass them on to the Physical layer who puts them on the wire (and vice versa). IEEE LAN standards such as 802.3, 802.4, 802.5, and 802.11 define standards for the MAC sublayer as well as the Physical layer.


PHYSICAL (LAYER 1)

This layer communicates directly with the physical media. It is responsible for activating, maintaining and deactivating the physical link. It handles a raw bits stream and places it on the wire to be picked up by the Physical layer at the receiving node. It defines electrical and optical signaling, voltage levels, data transmission rates, as well as mechanical specifications such as cable lengths and connectors, the amount of pins and their functions. Examples of devices that operate on this layer are hubs/concentrators, repeaters, NICs, WAPs, and LAN and WAN interfaces such as RS-232, OC-3, BRI, and antennas.

Monday, 4 August 2014

Ethernet Media Standards


Ethernet, Fast Ethernet and Gigabit Ethernet, are identified by three-part names, which is also known as Media Standard. An example of Media Standard is 10BASE-T. The first part of the Media Standard specifies the transmission speed (10, in this case specifies 10 Mbps)
The second part of the name "BASE" specifies that the Ethernet signal is a Basebandsignal.
The final part of the Ethernet Media Standard specifies the kind of cable used. Here "T" specifies twisted-pair cable. The following table shows the common Ethernet Media Standards.
Media Standard
Cable Type
Bandwidth Capacity
Maximum Length
10Base2
Coax
10 Mbps
185m
10Base5
Coax
10 Mbps
500m
10BaseT
UTP (CAT 3 or higher)
10 Mbps
100m
100BaseTX
UTP (CAT 5 or higher)
100 Mbps
100m
10BaseFL
Fibre Optic
10 Mbps
2Km
100BaseFX
Fibre Optic
100 Mbps
HD 400m/FD 2km
1000BaseT
UTP (CAT 5e or higher)
1 Gbps (1000 Mbps)
100m
1000BaseSX
Fibre Optic
1 Gbps (1000 Mbps)
MMF 550m
1000BaseLX
Fibre Optic
1 Gbps (1000 Mbps)
MMF 500m/SMF 10km
1000BaseCX
Fibre Optic
1 Gbps (1000 Mbps
100m
10GbaseSR
Fibre Optic
10 Gbps
300m
10GbaseLR
Fibre Optic
10 Gbps
SMF 10km

IEEE 802 Standards


The IEEE 802 Standards comprises a family of networking standards that cover the physical layer specifications of technologies. The following tables show the most popular IEEE 802 Standards.
Standard
Description
802.1
Internetworking
802.2
Logical link control
802.3
Ethernet
802.4
Token bus
802.5
Token ring
802.6
Metropolitan area network (MAN)
802.7
Broadband technology
802.8
Fiber-optic technology
802.9
Voice and data integration
802.10
Network security
802.11
Wireless networking
802.12
Demand priority networking

Ethernet Standards

Standard
Description
802.3
Ethernet CSMA /CD (10 Mbps)
802.3u
Fast Ethernet (100 Mbps)
802.3z
Gigabit Ethernet over fiber-optic cabling or coaxial cabling
802.3ab
Gigabit Ethernet over twisted-pair cabling
802.3ae
10-Gigabit Ethernet

Thursday, 8 May 2014

Hack administrator from Guest account

  • Go to C:/windows/system32
  • Copy cmd.exe and paste it on desktop
  • rename cmd.exe to sethc.exe
  • Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
When asked to overwrite,overwrite the sethc.exe - rdhacker.blogspot.com
  • Now Log out from your guest account and at the user select window,press shift key 5 times.
  • Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.
Press shift key 5 times and command prompt will open - rdhacker.blogspot.com
  • Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
  • You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
  • Congrats You have hacked admin from guest account.

Thursday, 3 April 2014

How to speed up SATA hard drives 

Speed up SATA hard drives

In Windows, by default, the advanced write caching feature of SATA hard drives is not enabled. To enable it, write ‘devmgmt.msc‘ in start menu search bar and hit enter to open the Device Manager.
Device manger How to speed up SATA hard drives in Windows 7
In the left side, select Disk Drives and rightt-click on it.
Device manger properties How to speed up SATA hard drives in Windows 7
Open its Properties and go to Policies tab.
Device manger properties 2 How to speed up SATA hard drives in Windows 7
There select Enable Advanced Performance.
Click OK.

Wednesday, 2 April 2014

How to identify unsigned drivers using sigverif utility in Windows XP | 8 | 7

A Device Driver is a program that controls or helps operate a hardware device. When 3rd-party vendors create a new driver, it can be submitted to Microsoft for “Device Signing“. This ensures the quality. To help maintain the integrity of your Windows operating system, critical files are digitally signed so that any changes to these may be easily detected. However, not all drivers are digitally signed, as a result of which some of them may cause system instability.

Identify unsigned & digitally signed Drivers

File Signature Verification Tool or sigverif

Microsoft has a tool in place in Windows 8 | 7 and Windows Vista calledsigverif.exe or the File Signature Verification Tool which helps you identify unsigned drivers.
To access it, type sigverif  in Windows search and hit Enter.
signverif How to identify unsigned drivers using sigverif utility in Windows 8 | 7
Click Start. The program will scan all the device drivers.
signverif utility How to identify unsigned drivers using sigverif utility in Windows 8 | 7
On completion of the scan, it will list down those which are not digitally signed. In my case since all were digitally signed, I received the following message.
sigverif 400x169 How to identify unsigned drivers using sigverif utility in Windows 8 | 7
Should you wish to see the list of all the drivers scanned, Click on Advanced & select View Log.
signverif advanced How to identify unsigned drivers using sigverif utility in Windows 8 | 7
You will be able to view the log.
signverif log How to identify unsigned drivers using sigverif utility in Windows 8 | 7

DirectX Diagnostic Tool or DxDiag.exe

To verify if your Drivers are digitally signed, you can run the DirectX Diagnostic Tool. To do so, type DxDiag.exe in the Search Box and hit Enter. The DirectX Diagnostic Tool is designed to help you troubleshoot DirectX-related issues.
dgx display How to identify unsigned drivers using sigverif utility in Windows 8 | 7
The DirectX Diagnostic tool (DXDiag.exe) gathers information about the system and the DirectX installed components. It also provides a number of tests to ensure that components are working properly. Use the diagnostic tool to create a report about your computer by running Dxdiag.exe and clicking on the Save All Information button.

Wednesday, 5 March 2014

How to Turn On Auto-Complete in the Command Prompt

Do you use the command prompt on a daily basis? If you do, then this tip is definitely for you! I recently found out that there is a way to turn on auto-complete for the command prompt via a simple registry hack. So that means if you are typing in a long path, simply type in the first few letters and then press TAB to auto-complete.
For example, if I am typing in C:\Documents and Settings\, I would just need to type inC:\Doc and then press the TAB key.

enable auto complete command prompt
dos prompt auto complete
As you can see, there is only one option that starts with “doc”, so it’s automatically filled along with quotes since it has spaces in the path! Now that’s pretty neat. I always loved using auto-complete in Windows Explorer or even in Open and Save dialogs, but never knew it could be done in the command prompt also.
You can also browse through the different folders and files in a directory by simply pressing the TAB key. So if you type in C:\ and then keep pressing the tab key, you will be able to cycle through all the folders and files in that path in alphabetical order, i.e. C:\Documents and Settings, C:\Program Files\, etc.

How to enable auto-complete for command prompt

Step 1: Click on Start, then Run and type in regedit
regedit
Step 2: Navigate to the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor
Step 3: Double-click on the “CompletionChar” key and change the value to 9
completionchar
Now close regedit and open the command prompt. Start typing in a partial path and then press TAB to auto-complete it! Pretty sweet eh! Great for anyone who has to work with the command prompt a lot. Enjoy!
1. Search for “Run” from the Windows Start screen and click on it to open its command prompt.
2. Type in “gpedit.msc” and click “OK.”
3. From the main screen of the Local Group Policy Editor, you want to head to the following entry:
Computer Configuration -> Administrative Templates -> Windows Component -> App Package Deployment
4. Right-click on “Allow all trusted apps to install.”
5. You’ll want to enable this entry to all non-Windows Store apps to install in Windows 8. Make sure to click “Apply,” then “OK” to change the entry’s settings.
Before you install any non-Windows Store apps, they still must meet two criteria:
  • The developer must cryptographically sign the app
  • Your computer must be able to accept the certificate
6. If the app meets these two conditions, then you’ll want to use Windows PowerShell to run the following command:
add-appxpackage C:\app1.appx –DependencyPath C:\winjs.appx
“app1.appx” is the app you want to install, you’ll need to change this as necessary depending on how it’s named.
“winjs.appx” is the dependency for the app, which you’ll also need to change if necessary. The dependency will be included with the app.
Now, you’re ready to use your new non-Windows Store app on Windows 8.
Make sure you’re only installing these apps from trusted sources and always keep aWindows 8 system recovery image or backup handy in case you run into issues.

Every Admin Should Know These Commands Active Directory 1.   To quickly list all the groups in your domain, with members, run this c...