Computer Virus:- 

Computer virus is a small program of malicious code, is written to alter the way of computer operation & spread it from one computer to another computer. It is similar to biological or flu virus which cannot reproduce without host cell. Computer virus spread through the programming files such as files or documents. It also spread by attachments in email messages or by instant messaging messages. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download.

A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk. Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of the devastating and irritating things a virus can do.

Symptoms of virus active in your system:-

  • Pop-ups will appear frequently on your desktop:- Frequently pop-ups will appear on your computer screen & show you message that your computer need protection, download any fake antivirus or unwanted software. This may be due to any spyware available in computer or rogueware (Fake antivirus).
  • Computer running slow :- If suddenly your computer running slow. It may be a symbol of virus, Worm, Trojen , which running tasks which consume more space & slow down your computer.
  • Home page redirect automatically: - uhh hoooo.. my home page redirect automatically to another website.
  • Multiple tabs open when open web browser which neither is nor requested by you…
  • Cannot connect to the internet or internet is very slow….. Yes it may happen due to malware which, establish another session through your internet connectivity & you may face this issue.
  • My antivirus & firewall getting disappeared.. any program like this may be stop working of going to disappeared due to failure of some program in your computer, but when your  all data security program disappear then you need to alert you are almost certainly infected.
  • Where have my data gone…..!!!! Usually no body asking these types of questions but.. Some types of thread may move your data from one location to other or encrypt them.
Till now you have familiar more words like Worm, Trojan horse, Spyware, Rouge ware, Malware etc.. so lets know these term.

What is worm?

Worm is a self replicating computer program that spreads without human interaction. Mostly it spreads from emails attachments that infect the computer when they are open. Worms uses system resources like hard drive & bandwidth by overloading a share network. It also steal data, install a backdoor and allow hackers to gain system control. So, keep monitoring your bandwidth , keep eyes on your hard drive, check time ti time for missing files of new files because worms delete and replace files in your computers.

What is spyware?

Spyware is a type of malware which can install on your computer without your knowledge. It can collect personal information secretly from your computer. Spyware can monitor your usually web browsing  activity, it may install un necessary software in your system & guide your web browser according to him or may control your system.

What is a trojan horse?

Trojan horse is a malicious program is not spread by themselves but they spreads from virus, worms or downloaded software.It can spread like....You might think you’ve received an email from someone you know and click on what looks like a legitimate attachment. But you’ve been fooled. The email is from a cyber criminal, and the file you clicked on — and downloaded and opened — has gone on to install malware on your device.When you execute the program, the malware can spread to other files and damage your computer.

What is rogue security software?

A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus. The names of these products frequently contain words like Antivirus, Shield, Security, Protection, or Fixer. This makes them sound legitimate. They frequently run right after you download them, or the next time that your computer starts. Rogue security software can prevent applications, such as Internet Explorer, from opening. Rogue security software might also display legitimate and important Windows files as infections.

What is malware?

Malware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system. Examples of malware include the following:

  • Viruses
  • Worms

  • Trojan horses
  • Spyware
  • Rogue security software

👆How to Protect your PC from virus & cyber attack.



Security awareness is health for digitization.So, Guys....Be aware Be safe.!!!! 😊😊😊😊😊


What is IP Subnetting :- 

IP Subnetting is a process of breaking a large network IP range to the small & reliable subnets. Subnets means the subnetwork of a large network. Subnet mask contains network & host portion. We acquire host portion to the network & perform subnetting. We know that one large network is not good thing so, we reduce the network congestion in our organization using subnetting.

Lets see an example of a large network :- 192.168.10.1/24 of class c default network, so the subnet mask is 255.255.255.0, now convert this decimal value into binary.

  255          .  255          .  255         . 0

11111111 . 11111111 . 11111111 . 00000000

            Network Bit                           Host Bit

All ones are on bits & represent network bit & all zeros are off bits represents as host bit. every octate have a maximum number is 255 in decimal, so, as per the above example there are 255 hosts available in the network range. suppose if we required only 25 hosts then our (255-30 = 225) IP will be waste. 
We need subnetting to Organized our network, Reduce congestion & Prevent unused IP addresses.
Yes we will do subnetting but before that lets understand one more terms is CIDR. 
Classless Inter-Domain Routing (CIDR) :-

CIDR is a slash (/) notation. When you receive any block of IP like 192.168.10.1/24 it is telling your subnet mask, slash notation means the on bits or the bits turns into 1's. In the block of 192.168.10.1/24, 24 bits are turned on. 
There are 4 octate in ip address, 8 bits in each so total number of  bits would be 8*4 = 32 . When we sunet any block there are 2 ip addresses are reserved first one for the Network address and Last one for Broadcast address, in the view of above till the /30 we have 4 ip addresses (2 are Network & Broadcast, other 2 are only valid host ip) so, practically to build a network we need 2 or more hosts & IPs. So, practically we can use only till /30 CIDR value.

Find the below subnet mask value for each slash notation CIDR value.


You can find out subnet mask for any slash (/) notation... as for example for /27 we have to find subnet mask so, we have already read IP class in last post What is IP address 
 if not please refer. So, /27 means there are 27 bits are on out of 32 like this:-

11111111.11111111.11111111. 1110 0 0 0 0

here we can see the power of 2 means 2x . in last octate there are 5 bits are off means 0...... we will subtract the value from the 256.

11111111.11111111.11111111. 111 0    0    0    0    0
                                                       🠛    🠛    ðŸ ›    ðŸ ›    ðŸ ›
                                                 25 = 32     24     23         22   21= 2           
We will count the power of two from right to left so the last off  bit  power of 2 is 32 so, minus this value from the 256. It will be 256-32= 224 so the subnet mask will be 255.255.255.240.
             
Now let's do subnetting in very easy steps.....!!! Think about these five points before subnet any IP block.

  1. How many subnets does the chosen subnet mask produce?
  2. How many valid hosts per subnet are available?
  3. What are the valid subnets?
  4. What’s the broadcast address of each subnet?
  5. What are the valid hosts in each subnet?

Now let's  subnet a block e.g 192.168.10.1/28, here /28 denote the total number of on bit out of 32 bits means total 1's. 

11111111 . 11111111 . 11111111 . 11110000

                Network Bit                            Host Bit
We are going to acquire host bit to the network bit since, it is a class C ip address so by default 24 bit allowed for network portion & we are going to acquire 4 more bits from the host portion, you can see in the highlighted text we have to check values from the portion from where we are acquiring bits.So................

    1. How many subnets does the chosen subnet mask produce?
We will use formula 2x here x is the on bits or the masked bit. So, in our example check the highlighted portion there are 4 masked bits or ones so it is simple to find the number of subnets is... 
24 = 2*2*2*2 =16 Subnets.

    2. How many valid hosts per subnet are available?
We will use formula 2y - 2 here y is off bit or all zeros.So, in our example check the highlighted portion there are 4 off bits or zeros so it is simple to find the number of  hosts per subnets is... 
24 – 2 = 14 hosts per subnets

    3. What are the valid subnets?
We can determined valid subnet by using formula 256-subnet mask so, it is 256- 240  (Subnet mask of /28 is 255.255.255.240) = 16 so, block starts with 0 then add 16 until 240.so it will be 0,16,32,48,64,80,96,112,128,144,160,176,192,208,224,240. 
    
    4. What’s the broadcast address of each subnet?
The broadcast address will be the number just before the next subnet number or the last number of current subnet block. lets check in our example we have already find the subnets in point number 3 so ,check the broadcast address of subnet 16 is 31, because the next subnet is 32..... broadcast address of 32 is 47.

    5. What are the valid hosts in each subnet?
Valid hosts are always a group of numbers between the subnet & broadcast address, we have already find the both in point number 3 & 4 so lets find the valid hosts for first block 0 to 15 the valid hosts will be 1-14 means there are valid host range is 14, as it is for the next block 16 to 31 valid hosts will be 17-30............. yes its easy!!!!!

This is how we can subnet easily & find all the required details. For this class c subnet find all the details in below mentioned table:-

Thank you for reading... comment on post for any doubt....... 😊😉



















Processor/CPU Overview:-


Central processing unit understand all the activities between human & computer then, process the the instruction further as a command of a computer program by performing the basic arithmetical, logical, and input/output operations of the system.CPU is basically brain of computer, it stores data, immediate results & instructions.It performs all type of data processing operations.It controls the operations of all parts of the computer. 




CPU has three main component:-   
  • Memory or Storage Unit
  • Control Unit
  • ALU(Arithmetic Logic Unit)


Memory or Storage Unit
This unit can store instructions, data, and intermediate results. This unit supplies information to other units of the computer when needed. It is also known as internal storage unit or the main memory or the primary storage or Random Access Memory (RAM).Its size affects speed, power, and capability.
Primary memory and secondary memory are two types of memories in the computer. Functions of the memory unit are :-
  • It stores all the data and the instructions required for processing.
  • It stores intermediate results of processing.
  • It stores the final results of processing before these results are released to an output device.
  • All inputs and outputs are transmitted through the main memory.
Control Unit
This unit controls the operations of all parts of the computer but does not carry out any actual data processing operations.
Functions of this unit are :-
  • It is responsible for controlling the transfer of data and instructions among other units of a computer.
  • It manages and coordinates all the units of the computer.
  • It obtains the instructions from the memory, interprets them, and directs the operation of the computer.
  • It communicates with Input/output devices for transfer of data or results from storage.
  • It does not process or store data.
ALU (Arithmetic Logic Unit)
  • Arithmetic Section
  • Logic Section
Arithmetic Section
Function of arithmetic section is to perform arithmetic operations like addition, subtraction, multiplication, and division. All complex operations are done by making repetitive use of the above operations.
Logic Section
Function of logic section is to perform logic operations such as comparing, selecting, matching, and merging of data.

CPU Features :- 


Speeds and Feeds :- Processor performance is usually a number in either MHz (megahertz) or GHz (gigahertz.) That number represents how many times the internal clock inside the CPU ticks in cycles per second. The clock inside a 2.5GHz CPU ticks 2.5 billion times each second.
But clock frequency isn’t a complete measure of performance. Efficiency — how much work can be done by the CPU in each clock cycle — is also important. This is measured in terms of instructions per cycle, often abbreviated as IPC. A CPU with a very high clock frequency, but low IPC, may not perform as well as a CPU with a lower clock frequency and high IPC.
Cache :- Fast access to memory is important to a PC processor, and that’s what your cache is for. Waiting for data to come in from system memory can make your CPU inefficient. The memory hierarchy is a way to show where memory bottlenecks exist. The CPU registers hold the data actually being used in calculations and comprise the fastest memory. The next fastest are levels 1 and 2 caches.
 These are small amounts of fast memory built right onto the CPU core. Level 1 (L1) cache is faster but smaller than Level 2 (L2). Some CPUs have a third level, which is often shared between different CPU cores. Even the L3 cache is much faster than your computer’s main memory.
 If an item of data is not in the cache, the CPU must wait until the data is retrieved from memory. In the slowest case, the data isn’t even in main memory, but must be fetched from the hard drive. However, while waiting for that data to be retrieved from system memory, the CPU can turn to a different task to help keep the PC running.
Cores:- Modern PC processors are multi core. Each core is as fully functional as the others. Each has its own cache, but can communicate with other CPU cores as needed. Cores can also share information in a cache, such as the level 3 cache built into AMD Phenom II processors. AMD’s Accelerated Processing Unit (APU) technology adds a new concept — the GPU core — which is better at certain kinds of math than the traditional core. The technology, originally developed for AMD’s Direct X 11-capable line of graphics cards, brings sophisticated graphics capability and parallel compute technology directly onto the CPU.
Current time you can see the cores like the mention below:-
  1. Dual Core Processor (It has two cores)
  2. Quad Core Processor (It has four cores)
  3. Hexa Core Processor (It has six cores)
  4. Octo Core Processor (It has eight cores)
  5. Decca Core Processor (It has ten cores)
Bandwidth:- CPUs are part of a larger platform. They need to communicate with the outside world. Data buses (circuits that carry the data) communicate with the chip sets built onto the motherboard. The chips act as traffic cops to route data to the outside world, for example to the PCI Express slots, which communicate with discrete graphics cards and other expansion cards, and USB ports, which communicate with external storage, keyboards, mice, etc.
 The speed of this communication is called bandwidth. It’s split into two types: memory and input/output (I/O). AMD processors have circuitry integrated into the CPU itself to handle all communication with system memory. This block of circuits is called the memory controller.

There are various companies manufactures processor but, below mentioned are the top processor manufacturing companies :-
  • Intel
  • AMD
  • Qualcomm
  • NVIDIA
  • IBM
  • Samsung
  • Motorola
  • Hewlett-Packard(HP)
Intel & AMD are the most demanding processor in current time. Choosing options & comparison between them:-

AMD Stands for Advance Micro Device was founded in 1969 & currently it is 2nd largest processor manufacturing company after Intel.AMD is said to offer the same basic product at the cheaper price than Intel.It consumption of power is more than Intel. AMD APUs made for gaming which contains CPU + GPU.AMD have low life/speed cpu's.

Intel Corporation was founded a year earlier in 1968  & its processors are costly than the AMD.Intel processors are power efficient.For gaming you need GPU which is not inbuilt in Intel processor  but both the processor performs well for gaming. Intel have better cpu's life/speed like Core I7 (8 cores every core have 3Ghz speed).



Devices used in Networking:-

HUB:- Hub is centralized device, which is used to connect multiple workstations.It has no special kind of memory. It simply receives the frame (data) and forwards it to all its nodes except the receiving node. It always performs broadcasting. In case of hub, there is one collision domain and one broadcast domain. The media access method is used CSMA/CD (Carrier Sense Multiple Access/Collision Detection).

There are two types of Hub: -

  • Active Hub
  • Passive Hub
Active Hub:- In Active hub, it receives the frame regenerate and then forward to all its nodes. It increases the distance between devices, and it amplifies the signal and also the noise with it.

Passive Hub:-In Passive hub, it simply receives the frame and forward to all its connected nodes. It reduces the cabling distance by half because it doesn’t boost the signal and in fact absorbs some of the signal.


SWITCH:-  Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has special kind of memory called mac address/filter/lookup table. Switch reads mac addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the destination mac address and consult with its filter table. If he has entry in its filter table then he forwards the frame to that particular mac address, if not found then it performs broadcasting to all its connected nodes.
Every port has its own buffer memory. A port has two queues one is input queue and second is output queue. When switch receives the frame, the frame is received in input queue and forward from output queue. So in case of switch there is no chance or place for collisions. In case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance). Switches provide more efficiency, more speed and security.

There are two types of switches: -

  •  Manageable switches (can be configured with console cable).
  • Non-manageable switches. 

BRIDGE:- Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the collision domain. It has same functionality as performed by switch. We can use bridge between two different typologies. It has fewer ports. Each port has a own buffer memory. It works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table. In case of bridge there is one broadcast domain.

ROUTER:-Router is hardware device, which is used to communicate two different networks. Router performs routing and path determination. It does not perform broadcast information. Routers learn remote network information from neighboring router.Router then build routing table, which is basically map of interconnected network & it describe how to find remote network.

LAN CARD:- Lan card is media access device. Lan card provide us connectivity in the network. There is a RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is another led which is also called heartbeat of Lan card. When any activity occur it may be receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan card.

Tricks:-

  • Move the cursor quicker to the beginning of the previous word by pressing CTRL+Left Arrow, instead of doing it manually.

  • To get the cursor to the beginning of the next word, use CTRL+Right Arrow.

  • Recover a deleted item with ALT+Backspace.

  • Delete an entire word by pressing CTRL+Backspace.

  • Select a word you want to highlight quickly, without dragging the mouse, by double-clicking on it.

  • Highlight a whole paragraph by triple-clicking on it.

  • Make superscript and sub text by pressing CTRL + = for sub, and CTRL+ Shift for superscript.

  • Close all your windows quickly if you’re in a hurry by pushing the Windows button +D, and they will all shut immediately.

  • Rename your highlighted files quickly by pressing FN + F2.

  • Re-open your last closed tab with Shift + CTRL + T on most browsers.

  • Instead of moving the cursor to the close (X) in the corner, press CTRL + W to close the current window.

  • Take a screen shot with Windows + Print Screen.

  • Adjust any setting on your PC with the Windows “God Mode” folder, which is a centralized Control Panel for all the OS settings.                                                                                                                                                  Access this by creating a new folder named: God Mode.{ED7BA470-8E54-465E-825C-99712043E01C}.


  • Problem Step Recorder will record all mouse clicks and take screenshots. This tool is helpful to a tech when an issue with your PC needs to be diagnosed. Use this by pressing Windows + R then type the letters “psr” & press enter.

Start recording dialogue box will be open like this 👉

You may save or review the recording steps & screenshots also....



Enjoy Guys......😊
 

How to Check Internet speed on Taskbar:-

Hello Guys!!! Generally we can check the speed of internet in our mobile phone but, not able to check in windows system. It is very easy to see now in windows machines. Let's do few steps..........

Step 1. We need to install a software. Download link is given below:-


Step 2. Open the download link & click on the Download now tab. 




Step 3. Select the software size as your windows support.



Step 4. Double click on setup to install.... but,oops!!! there are an error message. Setup could not be install in the higher version of windows 8 & more. 



Step 5. Right click on setup & go to property.



Step 6. Click on compatibility tab & check on "Run this program in compatibility mode for" Previous version of windows then click on Apply & Ok.



Step 7. Again double click on setup & let them install normally.

Step 8. Net Speed Monitor has been installed need few configuration to show on desktop. Right click anywhere on taskbar ➤ Toolbars ➤ NetSpeedMonitor.



Step 9. Yes guys!!! now you can see the Uplink & Downlink on your taskbar. Opps.. But speed is not monitored yet!!!!!!!



Step 10. Right click on the NetSpeedMonitored showing on taskbar & go to the connections. & Change or select your current connected internet driver. It may be WiFi of LAN on any other...


OK Guys Enjoy Now....!!!! 😊😊😊 






Hello Guys,

    Now I am Gonna Show You How to Get Password Behind the Asterisk, that is *******
    
Firstly we know the meaning of Asterisk:-
An asterisk is the sign *. It is used especially to indicate that there is further information about something in another part of the text.
    Follow the below steps:-

     Step 1:-  Firstly go to any login page in your web browser,(i have choose Facebook).


You can see here the password is saved under the Asterisk, and there are no any view option so you can click and view the password directly. Now, I will tell you the trick, how to see the password behind the Asterisk.
Step 2:-  Right click on the page and go to the inspect....


Step 3:- Press control + F and type password


you can see here there are 8 times password Shaun in the the search bar. You have to select input Type password for any page may be other than Facebook.


Step 4:- Now just  right click on the password found in yellow highlight and click on Add attribute.


      
Step 5:- Now double click on the passwords shown in yellow highlight and edit this "password" to the "text"




Finally guys it's working now..........
you can check in the asterisk ********change to the plain text and the password is visible now.

You May Also Watch:-
How to see password behind asterisk (*******) - https://youtu.be/Hn04o0bi8rY
How to hide drive without using any software - https://youtu.be/vqw2hy59USw
xxx


           



    

What is IP address ?

An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. An IP address is a software address, not a hardware address—the latter is hard-coded on a network interface card (NIC) and used for finding hosts on a local network. IP addressing was designed to allow hosts on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in.

Types of IP Address

 IPv4(IP Version 4)
 IPv6(IP Version 6)

IPv4(IP Version 4)
An IP address consists of 32 bits of information.These bits are divided into four sections  referred to as octets or bytes, with each containing 1 byte (8 bits).  You can depict an IP address using one of three methods:
·         Dotted-decimal, as in 172.16.30.66
·         Binary, as in 10101100.00010000.00011110.00111000

The 32-bit IP address is a structured or hierarchical address, as opposed to a flat or non hierarchical address. Although either type of addressing scheme could have been used, hierarchical addressing was chosen for a good reason. The advantage of this scheme is that it can handle a large number of addresses, namely 6.3 billion (a 32-bit address space with two possible values for each position—either 0 or 1—gives you 232, or 6,296,967,296). IPv4 is divided into classes.

classes

Network Address Range: Class A

The designers of the IP address scheme decided that the first bit of the first byte in a Class A
network address must always be off, or 0. This means a Class A address must be between 0 and 127 in the first byte, inclusive.Consider the following network address:
0xxxxxxx If we turn the other 7 bits all off and then turn them all on, we’ll find the Class A range of 

network addresses:
00000000 = 0
01111111 = 127

So, a Class A network is defined in the first octet between 0 and 127, and it can’t be less or more. Understand that 0 and 127 are not valid in a Class A network because they’re reserved addresses, which I’ll explain soon.

Network Address Range: Class B

In a Class B network, the RFCs state that the first bit of the first byte must always be turned
on but the second bit must always be turned off. If you turn the other 6 bits all off and then all on, you will find the range for a Class B network:
10000000 = 128
10111111 = 191
As you can see, a Class B network is defined when the first byte is configured from 128 to 191.

Network Address Range: Class C

For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on,
but the third bit can never be on. Following the same process as the previous classes, convert
from binary to decimal to find the range. Here’s the range for a Class C network:
11000000 = 192
11011111 = 223
So, if you see an IP address that starts at 192 and goes to 223, you’ll know it is a Class C IP address.

Network Address Ranges: Classes D and E

The addresses between 226 to 266 are reserved for Class D and E networks. Class D (226–239) is used for multicast addresses and Class E (260–266) for scientific purposes.



IPv6

Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv6 address exhaustion. IPv6 is intended to replace IPv6.

Every device on the Internet is assigned an IP address for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses than the IPv6 address space has available were necessary to connect new devices in the future. By 1998, the Internet Engineering Task Force (IETF) had formalized the successor protocol. IPv6 uses a 128-bit address, allowing 2128, or approximately 3.6×1038 addresses, or more than 7.9×1028 times as many as IPv6, which uses 32-bit addresses and provides approximately 6.3 billion addresses. The two protocols are not designed to be interoperable, complicating the transition to IPv6. However, several IPv6 transition mechanisms have been devised to permit communication between IPv6 and IPv6 hosts.

IPv6 provides other technical benefits in addition to a larger addressing space. In particular, it permits hierarchical address allocation methods that facilitate route aggregation across the Internet, and thus limit the expansion of routing tables. The use of multicast addressing is expanded and simplified, and provides additional optimization for the delivery of services. Device mobility, security, and configuration aspects have been considered in the design of the protocol.

IPv6 addresses are represented as eight groups of four hexadecimal digits separated by colons, for example 2001:0db8:86a3:0062:1000:8a2e:0370:7336, but methods to abbreviate this full notation exist.





                                                                             ipv6 conversion




Open Systems Interconnection



OSI model is the layer approach to design, develop and implement network. OSI provides following advantages: -
  • Designing of network will be standard base.
  •  Development of new technology will be faster.
  •  Devices from multiple vendors can communicate with each other.
  •  Implementation and troubleshooting of network will be easy.

1.  Application Layer: -
 Application layer accepts data and forward into the protocol stack. It creates user  interface between application software and protocol stack.

2.  Presentation Layer: -
This layer decides presentation format of the data. It also able to performs other function like compression/decompression and encryption/decryption.

3.  Session Layer: -
This layer initiate, maintain and terminate sessions between different applications. Due to this layer multiple application software can be executed at the same time.

4.  Transport Layer: -
Transport layer is responsible for connection oriented and connection less communication. Transport layer also performs other functions like
Error checking

  • Flow Control
  • Buffering
  • Windowing
  • Multiplexing
  • Sequencing
  • Positive Acknowledgement
  • Response


5.  Network Layer
This layer performs function like logical addressing and path determination. Each networking device has a physical address that is MAC address. But logical addressing is easier to communicate on large size network.

Logical addressing defines network address and host address. This type of addressing is used to simplify implementation of large network. Some examples of logical addressing are: - IP addresses, IPX addresses etc.

6.  Data Link Layer
The functions of Data Link layer are divided into two sub layers
  • Logical Link Control
  • Media Access Control
Logical Link Control defines the encapsulation that will be used by the NIC to delivered data to destination. Some examples of Logical Link Control are ARPA (Ethernet), 802.11 wi-fi.

Media Access Control defines methods to access the shared media and establish the identity with the help of MAC address. Some examples of Media Access Control are CSMA/CD, Token Passing.

7.  Physical Layer
Physical Layer is responsible to communicate bits over the media this layer deals with the standard defined for media and signals. This layer may also perform modulation and demodulation as required.

Followers

Translate

Subscribe Us

Enter your email address:

Delivered by FeedBurner

Cooming Soon

Routing Protocols

Popular Posts

Total Pageviews