Wednesday, May 29, 2013

IPv6

Charter (protocol) online version VI, (in English: Internet Protocol Version 6) is the development of the Charter of the online version IV IP. This new version ([IPv6]) comes at the same time many of the extensions and enhancements and Altkamilat to quarter capacity version (IPv4) and functions, including:

   
* Extend the addressing space dramatically: the sixth version uses a 128-bit per title (example: 2001:1234:5678:9:1:2:3:4) while the fourth version uses only 32 bits (for example: 192.0.2.1). This allows the extension you get all the computers harmonious today in الشابكة (internet) and all computers and other electronic devices that will be able later to get a unique addresses are not shared by one, enabling them then to connect to each other and to communicate directly, ie, without resort to devices which are called "interpreter addresses
   
* Self-configuration (auto-configuration).


  

With inflated interest in the network (the Internet), which began in the mid-nineties, it seems that in the next century will use the Internet to a large segment of people in these circumstances became Meevaq (Protocol) IP to evolve and become more flexible, while emerged this problem in 1995, the Organization [[[IETF]]] to begin work for the issuance of a new model of the IP, so do not be slow in the search for the address and solve many other problems and be more flexible, and called it the name of IPv6 The basic objectives of which are:
The basic objectives of the emergence of version 6

  
1. Dealing with billions of terminals (Terminals).
  
2.
  
3. Simplify Almivaq (Protocol) to allow the marches (Routers) to address packets (packets) faster.
  
4. Provide better protection of information (credibility + specificity) of [IP] that currently exist.
  
5. Exchange greater attention to the type of service provided, especially for real-time information.
  
6. Allowing endpoints to move without changing its address.
  
7. Allow Meevaq to evolve in the future.
  
8. Possibility Seen Moafik (protocols) the old and new together for years to come. Has achieved IPv6 these goals required well it contains good features for [IPv4] and avoiding the disadvantages of the former and adds new when needed, and in general, the IPv6 is not compatible with IPv4 in some of the properties, including properties of the Header for both of them, but it is compatible with the Internet protocols others, including DNS, BGP, OSFP, IGMP, UDP, TCP.
Building interoperability between version 4 and version 6
Transformation of the Internet Protocol IPv4 to IPv6 protocol suddenly is not possible because of the large size of the IPv4 Internet. In addition to that a lot of organizations become more reliance on the Internet in their daily work and as such bears no change Messaging System Protocol Alantert As a result, there will be no specific time is a stop IPv4 protocol and bring Protocol IPv6 misplaced because the two can co-exist with some of the non- any problems. And thus Atstia users take advantage of the IPv6 protocol and at the same time they can use the IPv4 protocol software and accessories. Some properties of the IPv6 protocol has been designed specifically to simplify the transition in the sense that it can be drawn IPv6 addresses automatically addresses IPv4, can also build a spending IPv6 networks, IPv4, this at least in the key stages and all points fork IPv6 will follow تظام matrices bilateral, in other words, that the two can Support each other.
This level of consistency between IPv4 and IPv6 protocol could make users believe that the transition to IPV6 protocol is not necessary, but do not switch to the IPv6 protocol will limit the development because it would deprive users permanently from the use of new applications.
I've been designing and talk IPv6 protocol in a precise and comprehensive manner of fields were tested before (IETF) and several research institutes, has been to create a project called (6-Bone) so that from which users can gain experience and use the IPv6 protocol packets.[Edit] important news in the march of the sixth edition

   
* 1996: The evolution of the Linux kernel program alpha version 2.1.8 of its program in order to fit with the sixth edition of the IP.
   
* 1997: at the end of this year (1997) operating system IBM AIX 4.3 was the first commercial software that supports this version of IP.
   
* 1998: The first pilot asked to research firm Microsoft, (not subtraction unusable with Microsoft products).
   
* 2000: Company age Solaris supports this version of IP for Solaris 8 since February 2000.
   
* 2001: Cisco supports this version of IP ME FOR محولاتها (Switches) and Mugeadtha the (Routers).
   
* 2002: limited support from the sixth version of IP for producers and Windows NT 4.0 and Windows 2000 SP1 (only for choices and research).
   
* 2002: support for the product and Windows XP for developmental purposes, in Windows XP SP1 and Windows Server 2000 version has been included my sixth for any nucleus for network technology which is very convenient for commercial deployment.
   

   
* 2007: The sixth version of IP is the default IP for Windows Vista.

Wednesday, May 22, 2013

IP Addressing and Subnetting

Addressing networks and dividedIP Addressing and Subnetting

The subject of networks and divided addressing one of the most important topics networking engineers seeking to Mastery for success in the workplace, and we will try through this lesson simplify the basics of tagging and division to make it is easy to understand and smooth absorption.IP address can be defined as a numerical identifier is assigned to each device on the network so that it becomes his special address easily accessible and locate it on the network and allows him to communicate with other devices.Before نتعمق in the topic you some simple terminology which will be used in the lesson:1 - Bit and is a number and has a value of 1 or zero.2 - Byte and consists of 8 bit and is sometimes called the Octet.3 - Network address network address and is used to send data to a specific network remotely and examples of it: 10.0.0.0, 172.16.0.0 and 192.168.10.0.4 - Title Publishing Broadcast address and is the address that is used by devices and applications to send information to all devices on the network and examples of it: 172.16.255.255, which means the information is sent to all devices and subnets in the network with the address 172.16.0.0, and another example: 10.255.255.255, which sends data to all devices and subnets in a network 10.0.0.0.The IP address consists of 32 bit and be divided into four sections, each section is a byte or octet and is written to one of the following methods:1 - using the decimal system, and each section is separated from the other point, such as: 172.16.30.56.2 - using the binary system, such as: 10101100.00010000.00011110.00111000.3 - using the hexadecimal system, such as: AC 10 1E 38 and is used in the system log Windows Registry.All previous methods used to display the same address, but in different ways and the most commonly used among them is the first method and is similar to phone numbers where starts with country and region, and then your phone number.You need to know that all the devices connected to the same network share that IP addresses for each of them contain the same network address, for example, assume the presence of two devices in one network has the address 192.168.1.2 and the other has the address 192.168.1.3 note they share the same network address is 192.168 1, but each of them your address and called the node address or host address, which in our example for the first 2 device and the second device 3.
Web designers decided to create several types of networks according to the size of the network, they chose to few in number and networks that contain a large number of devices to call them Class A network. While many opted for networks and number that contain a small number of devices to call them Class C network. The network number and medium-sized chose to call them Class B network.The following note in the picture how to split the titles in each of the previous species, and we will discuss it in more detail.
 
Before we take all the titles in more detail I suggest that you join me in this review necessary to convert the binary system to the decimal system:

As mentioned, each byte consists of 8 bits is expressed in the binary system and each bit is either a value of 0 or 1 and each bit value of the interview in the decimal system as follows:

128   64   32   16   8   4   2   1 
:Consider the following example



 Now to transform the binary number 00100110 to decimal number we collect decimal values ​​corresponding to each bit carries a value of 1:2 + 4 + 32 = 38Another example:01010101 to turn it into a decimal number we collect decimal values ​​corresponding to each bit carries a value of 1:1 +4 +16 +64 = 85Other examples:00001111 = 1510001100 = 14011001100 = 204Now that we understand how to convert suggest you save the following values ​​where too will help you later:00000000 = 010000000 = 12811000000 = 19211100000 = 22411110000 = 24011111000 = 24811111100 = 25211111110 = 25411111111 = 255
The first term network addresses: Class AFeatures a range of network addresses in accordance with the decision of مصمموها that the first bit of the first byte of the network address belonging to the Class A must be zero, which means that addresses the long Class A should be between 0 and 127, to understand how we got these two numbers to consider together to the first byte, which agreed that the first bit of it should be 0 this means that the titles in this byte will start from:00000000And ending title:01111111When converting the numbers into the decimal system we get the following:00000000 = 001111111 = 127So then, if we see any IP address starts with any number between 0 and 127 will know that it belongs to the term Class A.
The second term network addresses: Class B
Addresses this range is characterized by the decision of the designers of the first bit of the first byte of the network address belonging to the Class B must be a value of 1 while deciding the second must be a value of 0 always, and this got the address from 10000000 = 128 and ending with 10111111 = 191.
The third term network addresses: Class C
This addresses the long characterized the decision of the designers of the first and second bit of the first byte carrying value of 1 while the third carries deciding the value is always 0, and that we got over the headlines as of 11000000 = 192 and ending with 11,011,111 = 223.

There are some titles that can not be granted to the network manager devices never though they may belong to the extent permitted as follows:1 - Title 0.0.0.0 and is used by routers routers, a subsidiary of Cisco to refer to the default destination default route when routing data packets.2 - Address 255.255.255.255 and is used to broadcast or send data to all nodes on the network devices present.3 - can not be part of the IP address of the device the whole 255 or 0 you can not give a device the following address, for example: 128.2.255.255 or 128.2.0.0 and is another example:192.168.1.255 or 192.168.1.0, indicates where each of 128.2.0.0 and 192.168.1.0 to the network address while refers both 192.168.1.255 and 128.2.255.255 to the user in the address broadcast to all network devices.
4 - can not be part of the network's IP address the whole 0 or 255, no you can not give a device the following address: 0.1.5.3.
5 - 127.0.0.1 address can not be granted to any device and is used automatically by the device for the purpose of the test is connected that says send the package to the same data.

Monday, May 20, 2013

tcp / ip lesson

by :
samer samir‬‏
 
The first lesson
 General definition of the TCP / IP
Two can humans communicate with each other practically when they agree on the use of a specific language. Can speak Arabic, English, Spanish, French or any other language but you must use the same language. Computers work the same way. Transmission Control Protocol / Internet Protocol (TCP / IP) is an abbreviation of the term. Is a language spoken by computers. TCP / IP is a set of rules that define how correspond any Kmpiotran, with each and data يتراسلان with each other. This set of rules called the Protocol. Set of protocols which brought together constitute Protocol suite or Protocol stack and work together in the so-called Protocol stack or pack Protocol.
TCP / IP is one of the protocols, strong, fast, removable twist, and is considered an efficient set of protocols. Protocol Protocol stack package This is the internet protocol commonly used now. Because the exchange rate has become more extensive information, many individuals and companies will need to understand the TCP IP.

What is the TCP / IP:

TCP / IP is a set of protocols that enable computers to communicate. In the normal case, and when you do not need computers to be connected to each no final حوجة to agreed protocols between devices. But when you connect computers together in a network show الحوجة to agreed protocols. Today can any network manager PCs to choose from more than one protocol, but the protocol TCP / IP is the most widely used. Part of the reason is simply that the TCP IP is used by the world's largest network of INTERNET. If you want to your computer communicates with the Internet must use the TCP / IP.

The TCP / IP package for example Protocol or Protocol Suite (description of a set of protocols that work with each other). Ali called TCP / IP Protocol suite term or Protocol Stack and both terms are used interchangeably any Aattiyan the same meaning although they differ a little bit. Another reason for goodwill TCP IP is that it is compatible with almost any computer in the world.* s XP, ****** s 2003, Linux, Unix, Netware. TCP / IP is also called the language of the Internet. It is also the language of many small networks. All the computers attached to the Internet in order to relate effectively must agree on the language. Like any human language have rules so that people who are engaged in the conversation to يفهوا what others say. Language computer needs to a set of rules so that computers can connect effectively. Some of the rules of the language used by computers to connect to include on when data is sent and when it is received.
1 / features of TCP IP:
TCP / IP user for more than 20 years. TCP / IP has many of the features and benefits. We will examine in this section the most important.
1 / interoperability:
One of the biggest reasons why the TCP / IP suite is gaining popularity and universal acceptance is that it can be mounted and used in a practical way on any operating system. Using TCP / IP can Unix server that connects and sends the data to a DOS server or server ****** s. The server is the last name of the computer or device on the network. And can say that TCP / IP was canceled inconsistencies in different applications.
2 / flexibility:
TCP / IP protocol is very flexible block, in the next lessons we will know some of the features that led to this flexibility.
An example of the flexibility of TCP / IP includes the removal of the hardship faced by the Administrator Director in the allocation and reallocation titles Addresses.
3 / ease of movement:
One of the more restrictions protocols are difficult to transfer data from one sector to another sector network. TCP / IP stack exceptionally designed to transmit data from any sector of the network to the other sector or from any server in the network part of the world to any other server in the network elsewhere in the world.

3 / internet continued:

Understand the roots and the basics of online will open بصيرتك for the development of TCP / IP and many of the rules and standards. Internet today is the continued ARPAnet, a network created by strong Research Projects Agency sophisticated - Advanced Research Projects Agency - short (ARPA) and launched in the year 1969. It is a subsidiary of the U.S. Department of Defense was created at the end of 1950. This network was established to be responsible in particular for the potential threat of a nuclear attack by the Soviet Union. One of the fundamental goals of ARPA is to create a basic network that allows for the leaders of the U.S. troops that remain in constant contact in the event of a nuclear war. ARPA network began its mission to establish what seems like an impossible requirement. With ARPAnet growth appeared الحوجة to the new protocol because NCP is simply not cover all the needs of large network. We can compare the NCP humanitarian language that does not contain only a few words. Language can be a few people managed to connect with each other, but if you entered more people who want to speak in many of the threads should be the evolution of the language of communication. If the NCP has a lot of flaws and not strong enough for a strong network began to grow out of control. Disadvantages of the NCP and ARPAnet growth led to the search for the development of a new web language.

4 / TCP / IP:

It is a paper describing the Transmission Control Protocol (TCP), a protocol in the Protocol suite and eventually will replace the NCP. As we will examine in the coming seminars TCP official to make sure that the data and reached to the other computer. In 1982 he decided that replaces the NCP Pal TCP / IP as the basic language for ARPAnet. In 1990 ARPAnet was removed from existence. Internet then it has grown from the roots of the ARPAnet, and developed the TCP / IP to meet the changing requirements of the Internet.


5 / goals of the design of the TCP / IP:

TCP / IP evolution of the current to the nines, and protocols within the TCP / IP suite has been tested and modified and developed with time. TCP / IP protocol suite has several design goals to be an effective protocol for large and sophisticated network. Some of these goals include: 1 / independence of the type of devices: Protocol package that can be used on the Mac, PC, mainframe, or any computer. 2 / independent of the type of programming: Protocol package can be used by various manufacturers and software applications. This allows the device to connect to site in another site without the two have the same program. 3 / fix the error and the ability to carry a high error rates: Package Protocol distinct b automatic repair any data coming in or are missing. This protocol can repair any interruption from any device in any part of the network at any point in the data sent. 4 / less efficient system to download: Protocol package carrying a small amount of additional data access with the transmitted data. These few data called overload. Overhead overload similar circumstance use to send a message, or use the fund to send big things and filled with more than its normal load. 5 / ability to add networks on the internal network without obstruction service or dropping the internal network. 6 / packet protocol in which data can make their way through the internal network of computers to any potential direction. To be possible single addressing scheme and has a significance must be used for any computer moves the data can be calculated the best way for each piece of data is also moving within the network.
TCP / IP was developed to meet these goals, and through our study we will know you already covered its design goals or not.




Important terms:

Protocols A set of rules and standards that govern communications.
Network administrator The person who installs and monitors and solve network problems.
Host

ARPAnet Network and Advanced Research Projects Agency, the predecessor of the Internet.
Network Control Protocol (NCP The protocol used by TCP / IP.
Transmission Control Protocol (TCP Protocol that describes the communication between devices.
Transmission Control Protocol / Internet Protocol (TCP / IP
A package of protocols involved to be the language of the Internet.

The third lesson

Important lesson is that you will know exactly how data traffic

Protocols Protocols

What are the protocols:
Protocol is a rule or set of rules and criteria used to connect computers when you send data back and forth. Both sender and future المشتركان in the data sent must recognize the same protocols.
For the exchange of data, sending and receiving computers, also called Hosts, must agree on the form of the data. When the Host sends to another Host each bundle 1s and 0s both must agree on the meaning of and Trivhaltenseeb Lai 1 and 0. Part of the information you send represent titles and part represents the data.
Each HOST has a special address, as your home address particularly in شارعكم. And also like letters of mail that is sent to your address. Data that is delivered to the appropriate Host rely on its title. The Host which sends information must understand how to find the correct address of the Data, the data to be able to find its way to its destination.
As we mentioned earlier when start Kabiotrat, in contact, you must first agree on a protocol to use it.

Set of protocols called protocol suite or protocol stack. Protocol addresses per issuing special help to contact. When you combine the protocol with other protocols, the resulting total protocols called protocol suite. TCP / IP as an example is a protocol suite. In a computer connected to the network, the program, which combines data of sending so-called protocol stack. When computer data, they move through the protocol stack.
There are a lot of protocols in use today. Protocols, some of which are owned by a special-use. Developed for specific goals to meet the special needs of some of the software or hardware. And one of the most famous of the protocol suites in Telecommunication networks include:
1 / IPX / SPX: Is a protocol suite designed by Novell, Inc. and used in operating systems.
2 / Apple Talk: Is a protocol suite designed by Apple and used in operating systems.
3 / TCP / IP: Is a protocol suite and the Internet has become a standard.

Ok get into a little depth ..


Protocols move data packets:
When data is sent from Host to another based TCP / IP protocol dividing them into manageable pieces and these pieces called packets packet or packets. Protocol determines how it will form and the address of the packets. The packets such as funds used to ship the Data or data. Each packet along with their headers which information package that accompanied her to sign it. Which makes it possible to reassemble the Packets and taking the original data in the data view. Headers or information package attached with the data package for the same reason which it was stuck to the preamble to the parcel to the sender via mail to someone else. Computer that sends data to another computer is like me when sent to another human being expelled.
Will strike a practical example of clarifying the matter: If I am Do you want sent to the son of my sister bike in another city. Bike represent our data that we want to send them to another computer. Send bike must follow certain rules and protocols to reach the bike.
1 / setter bike in the expulsion or several parcels if they can not be placed on the expulsion of one, in this example represents the expulsion packets.
2 / and put the bike inside the parcel, the next step is to put the title on the parcel. But there are protocols and laws to put the address on the parcel: You must use the correct name of the sister as well as the title track. Title preamble should contain the information necessary parts until the package reaches the intended destination, for example, street address, city, county or region, the key to the city. This is quite similar to TCP / IP information when placing package Headers Ali package data packets that will be sent.
3 / as well as put a return address on the preamble and this looks like a data package that also contain information on the source sent him.
4 / There is a specific place for each headlining this information must be hoping data per package, but will not reach its destination.
5 / finally refer to any one of the packages required to open it for writing (1 of 5) (2 of 5), etc. .. . And this helps my sister to know any expulsion open first, then second, etc. .. Then you can easily reassemble the bike. 6 / when the parcels be ready, in need to decide what kind of receiving want to use and formulas preambles packages depend on the messaging service or type of company you have chosen, for example: If you choose the DHL h put packages in boxes of DHL, if you choose the ARAMEX EXPRESS certainly h put Sanadiki in Alaramax and so on. The same thing is happening in the computer world is encapsulated packets format or formats are suitable for the existing physical network within the sending computer. If the computer Ethernet network or Ethernet network packets must be on the appropriate formula for transmission over Ethernet work. If the packets on Token Ring network or Token Ring network packets imposed formulas are Token Ring.
7 / Now we come to the delivery stage, contacted the mail man to come and take parcels, but neither I nor is it will be handed the parcel!!! Why then .. We will know now .. Written statements as appropriate in a moving transport system from ماكن to another, the parcels are likely to take different ways, but in the end will reach the same destination. Will be handed over to their address depending on the address and developed by Ali الديباجات. The same understanding if there is a problem with the company to tell me because I put a return address on the parcel.
8 / After the parcel to reach to my sister Stfathhm, and you can reassemble the bike based on the information that Ali الديباجات. Similarly, the future for computer data packets that can collect data based on the information that came with the packages which the Headers.
9 / Finally parcel after funds will aim to take the information that want from الديباجات, and who really wants is a bike and every mission that funds reach the bike to the intended destination permission to Ahogh the funds after the end of its mission. The same idea is used when we use the TCP / IP to send data packets to be based on information attached to it, and after he renounces use the attached important information required data was delivered to the program that request.

The picture below describes Ahmed, a computer sends data to a computer Sarah. Note that the data was disaggregated into several packages, each containing a unique serial number. Computer in the future Sarah reassemble the data back to a formula that is not fragmented. I mean congregate in the original image, which has sent them.





Important terms:
protocol suite A set of protocols
protocol stack Suite of protocols send and receive data
Headers Information to be attached with small packets and always contain the address and data path information

The fourth lesson




The standard model for networks Open System Interconnection . :::: OSI ::::.





If you want to set up a network for the exchange of information and data, it must be compatible devices in the networking method. It consists OSI model of seven layers allows the student to understand the various functions and processes in the network, and most importantly, that this model is a structure to understand the mechanism of transmission of information in the network, in addition to the possibility of using it to represent the mechanism for the transmission of information (information) or data packets (data packets) of programs Applied (eg: spreadsheet programs or word processing programs) in the center of transport in the network (such as: wire (Wires)) applied to a program on another computer on a network, even if the network type differed sender of the type of network the future.
We can define the goal of the establishment of the OSI that is used to divide the many tasks required to transfer data from one computer to another. To small steps. These steps of small nominate the layers, or layers, and consists of seven OSI layers. Each layer Msiwoladtha the own.
The seven layers are:
1 / Application 2 / Presentation 3 / Session 4 / Transport 5 / Network 6 / Data-link 7 / Physical


The OSI model is a way to partition data types related to the way that helps Network Administrator Network Manager to address network problems.
Responsibility for each layer:
In the data during the passage of the seven layers in the network, each layer puts Basic called Header on the package.
Ok now H's take a quick look at each application task:
1 / The Application Layer The application layer or the program:
The highest layer in the OSI model objective of the application layer is to manage the communication between applications. Applications or software application layer is standard or standard programs interact with the ongoing program in the network. To explain that you have the programmer who wrote the Word program was written so that reacts with the standard software in the application layer. Word program that uses standard network software is to save, copy, delete folders and documents. The application layer is which receives the data and programs required as well. All other classes are working for this layer.
2 / The Presentation Layer Presentation layer:
Presentation layer immediately below the application layer and the top layer of the meeting. Presentation layer adds structure to data packets that are exchanged. Main task of the presentation layer is to make sure the message sent in the language or code future computer can understand. In the application layer protocols are potentially translate data into understandable symbols then Tdguetha and possibly encrypted before sent to the Session layer or session that followed.
3 / The Session Layer Session Layer:
Followed by the presentation layer. Control the communication during the dialogue. And manages sessions between related parties. Protocols covering topics such as how to set up a connection, how to use it, and how it separates the contact when the session is completed. When you begin Contact session layer review Sent mistakes. Add in control of the information packet data during the data exchange.
4 / The Transport Layer Transport Layer:
Ensure that packets that arrive. Toss to communicate and send reports of the arrival of packets. This design protocols provide the means of establishing, processing, and launch joint communication devices to contact ..
5 / The Network Layer Network Layer:
Responsible for passing data based on logical addresses. Fragmentation and reassemble packets if necessary. Move packets from source to destination through networks.
6 / The Data-Link Layer Data-link layer:
Where data processing is finally delivered to the network. Packets are encapsulated within the framework of (a term used to describe the data packets bilateral binary data). In this layer protocols help in addressing the discovery of mistakes that will transform data. Data-link layer consists of two high schools: the first Logical Link Control (LLC) or logical link control. And the second Media Access Control (MAC). Each layer secondary offering its own services. LLC represents the interface between the network layer protocols and media entry method, for example, Ethernet or Token Ring. MAC address physical contact with the media or the physical network connections such as twisted-pair or coaxial cabling.
7 / The Physical Layer Physical layer:
Is the last layer in the OSI model you select how to send and receive mobile data cut in the wire network. This application works in the hot zone of the whole process, as it puts the cut data in them and take the wire, and here we can talk about the data as slices and packages.
And now .. How does the OSI model:
Synthesis and manufacturing packages packets starts at the top of the OSI model. Application layer takes the data to be sent and pass them down to the application layer where it placed header or new information. Presentation layer packet data is passed down, and in the same way each application is developing its information on data packet until finally delivered to the physical layer. The application of physical physical layer dividing the packets on the network wire, and data continue on its way to its destination. In place of arrival, the data packets moving in the opposite direction, from the bottom of the form to the top. Application material at the point of protocol package who snapped a package outside the network wire and passes it to the top To the data link layer. Data-link layer test package information developed by the data link layer on the package. If this is not the point of the package, the package is culled. But if this is the point of the packet data link protocols apply to disarm application layer header sent with package and Tmrrkl the package to the top To the network layer. This is repeated in each layer until the data reaches the top of the form.
In this way any application from the sender's computer communicates with the same application from the computer future.




Model DoD:
The following table shows a comparison between the two models and how to the DoD cut short many of the functions of the OSI in its design.
In this way any application from the sender's computer communicates with the same application of Alkmpiotralmstqubl.




Pack the TCP / IP was developed before they even published the OSI model. As a result, TCP / IP packet does not use the OSI reference model. TCP / IP model has been developed using the Department of Defense (DoD) as a reference. But very important that you are dealing with the OSI and the reason that the OSI is used to compare the TCP / IP packet and rest protocols packages. Unlike the OSI model the DoD model contains four layers. However the DoD model processes the data in the same way that addresses the OSI model the same data. Only difference in the number of stages of data processing.
DoD layers of the model or the Department of Defense:
1 / Application covering the same tasks for the application + file + session in the OSI model. 2 / Transport covers the same functions of the transport layer in the OSI. 3 / Internet covers the same functions of the network layer in the OSI. 4 / Network Interface Layer covers the same data link layer functions + material.
The next lessons will be the breakdown of the work of each layer separately.
The following table shows a comparison between the two models and how to the DoD cut short many of the functions of the OSI in its design.


Important terms
International Organization for Standardization (ISO) International Organization for Standardization:
Organization that has ratified the OSI model.
Open System Interconnection model (OSI) Reference Model for networks
The seven layers model used in the division of tasks that needed to move data from one computer to another.
Layer Class:
Part of the OSI and organize tasks between different protocols so as not to conflict occurs or deficiency in their work.
Department of Defense (DoD)
Department of Defense (American, of course)
Peer-layer Communication Contacts peer layer:
Type of communication where any application from the sender's computer communicates with the same application in the future computer.


The fifth lesson :: 1 ::

The Network Interface Layer

Network interface layer and a layer Internet address by packets. These layers interact with the network defines how the movement of packets to and from the network. As previously known protocols put little information on the packages as placed الديباجات on the packages that will be sent through the mail.
Network Interface Layer The Network Interface Layer


The lowest in the block layer TCP / IP is the Network Interface Layer, or network interface layer. The main responsibility for the network interface layer is to define how to connect to a computer with the network. This is the most important part in the process of receiving data Computer must follow the rules of sending and receiving data in relation to the nature of the network installation. There is only one way to learn how to interact with the computer network layer so you can compare them with a realistic example.
Example :: Suppose you send a card Congratulations and chocolate cake for a friend in the hospital. The first step you are responsible of processing things that will send Knglifaa the look sweet then type the address. So here you are who you worked. Altanih step is passed to another delivery system has its own procedures. You can use any quick service company to deliver the envelope. It also must follow the rules that the company deals with its customers, an example of how to write the address, how to pay for the employee in charge, ensure the envelope address (in the case of re-entry). After it arrives at my friend the Mesh Hehtm envelope how he arrived to him only حيكون the happy Ballahda. Network layer similar to the reception in the hospital. Archeology Centre staff sent a lot of stuff is in the hospital and we have to decide what will send them to patients. After seeing that gift addressed properly, they passing it to your friend. Will is unzip the gift to eat the cake and read the card attached with it. What will the network layer in a computer connected to a network that is similar to going to do you with service to send as a gift. Network interface layer used to receive and send data packets. When the package arrives by the network card, the Network Layer representation of the role of the reception department at the hospital and decided to pass the package to block or packet protocol to address the hardware address or Hardware address. If the package is equipped by a block protocol is eventually passed to the network layer to be placed in the network. In the application and the network interface information that came with the package Header, which contains address information package. Under the package information there is a title called hardware address or e-gear.
Title gear Hardware Address
With any package of information about them data header contains the address information. This information attached to help package has access to the right place. Address information of this comes from the title of a physicist prints on any network card when make-kart. This address will not change as long as the card works. Ali called this address any of the following names: 1 / Hardware Address 2 / Media Access Control (MAC) address 3 / Ethernet address 4 / Physical address 5 / Network Interface Card (NIC) address Address hardware-specific networking cards, whatever the manufacturer. Consists of 12 hexadecimal hexadecimal number in the title. It looks like this: 00: A0: C9: 0F: 92: A5 :: Decimal system is suitable for humans, while the binary counting system is appropriate for the machine, and is counting system XVI amid or Tawfiq them ::
The first six digits of the hexadecimal numbers illustrate a particular manufacturing network card manufacturer. The last six digits of particular serial number has selected a network card factory. Note :: To occur every TCP / IP, the sender of the package must know the hardware address and the delivery destination. In order to receive the package TCP / IP must contain the hardware address and the delivery destination. If the package arrives to the network card, part of the package that contains the address of the target hardware, checking to see if the package is intended for that device. If the hardware address (network card target) target agreed sender network card or if the package is sent to all devices including called pal Broadcast, the packet is passed to block TCP / IP protocol for processing. If the target hardware address different for package packets, the package executes or renounced.
Send packets to several PCs once Broadcast Packets
Any package should be entitled to a computer. As we mentioned earlier when the package moves through the network, each computer will examine any package to know any of them is entitled to the address of the computer hardware.
:: Means Balblde the package Keda cattle in each network one of Eachd devices including who the sender Les ups and the remaining Yeceb to they did not send him :: like this can be and Aktar clarified. But can pack packet it sends all devices at one time? Answer :: Yes :: Data packet can be sent to all devices in the network once. This type is called sending out the package for several devices broadcast packet. This package contains the address different from the address ordinary package sent to a single device. Form are as follows: FF: FF: FF: FF: FF: FF

Internet Layer The Internet Layer


Internet layer located in the TCP / IP model between the network interface layer and the transport layer. Internet layer contains the protocols in charge of addressing and routing packets, which contain multiple protocols protocols include: 1 / Internet Protocol :: IP :: 2 / Address Resolution Protocol :: ARP :: 3 / Internet Control Message Protocol :: ICMP :: 4 / Internet Group Message Protocol :: IGMP ::



The fifth lesson :: 2 ::
Internet Layer The Internet Layer
Internet layer located in the TCP / IP model between the network interface layer and the transport layer. Internet layer contains the protocols in charge of addressing and routing packets, which contain multiple protocols protocols include: 1 / Internet Protocol :: IP :: 2 / Address Resolution Protocol :: ARP :: 3 / Internet Control Message Protocol :: ICMP :: 4 / Internet Group Message Protocol :: IGMP ::
Internet Protocol is the main protocol layer in the block internet TCP / IP. This protocol is responsible to determine the source and the destination IP address of any package. We find that the IP address IP address given to the logical address logical address Hoalve the network manager customize it for your computer. Each computer in the network has Internet Protocol address of its own.
Example of the IP address:
192.168.2.51
**********
. :: Waukee youth Do you want point out an important need, like what to Ahztwa Touch term and translate good was possible type of translation and Lancy original term, but in the real world when dealing with appliances, and even if the operating system is in Arabic in certain things you h received written in the the terminology original image. Example IP address Mesh possible received written an IP address, but never in a place Tani settings. Keeps agree on the need for a fixed term means Mesh ordinary English words, is important for anyone who wants to develop himself,,, and anyone who wants to take the technical area which was why? Because if the back of a new science and new technology in your field and you are weak in the language English Anarafha how!! Waiting for translation .. Oak km of time you will find it translated in an acceptable, keep in the end lancy Omh's never h progressing. Ok ÇÍäÇ needy Er now, Mesh need many need one ups, after what I translate the term and repeat it several times Mesh Hactmr in writing in Arabic and English shill just typed in English means if the received IP address understand along Ende Internet address is another shortcut for the translation itself is originally Internet Protocol address, Acronym say Internet address. And h start from Internet address ساسميه the in any explanations IP address. We started him because he will be adopted by many of the lessons to come. ::.

**********

This address is allocated by the Director of the computer and it should be a special address to the existing network. Part of the IP address represents the network device where there is a host, and the other part is the device itself is located on that network.
:: Street where you live like the IP address. Speech, which is sent to you will be delivered to your home because of the logical address. Or could resemble email follow thee pal IP address. Receive a message for the main reason that the sender of the message, use the address is correct, and the result certainly will receive a message because of the title. If deported to another house in another street address will change and your letters will be sent to the new address, but that delivers you the letters is the same. :: When you pass the Packet or packet data to block the TCP / IP address of the sending placed the target or the addressee to in the header IP or IP information. The IP specifies the target machine Local Local Umm remote Remote. Target be local if the IP said that the target device on the same network. Objective be remote if the IP said that the goal in the other network. The IP address that identifies the type of the target device or the future, depending on the IP address is located where and Subnet Mask in the sending device.
The definition of the Subnet Mask :: is this part is very important because it determines the identity of the network, and is used in large networks when divided number one IP into several sections and become each number represents an independent network, but share all of these networks, the identity of the one represented by the Subnet Mask and the Subnet mean division He determines the network number and device ID ::. You will learn about it in detail in the next lessons.
Determine the direction of the local data: local or distant remote: The IP needs to determine how the data arrive at the destination. If the (machine) address in a local area network TCP / IP can communicate directly with the device is intended. If the device is in another network or far, the TCP / IP needs to send the package through the Default Gateway. The definition of the Default Gateway :: also called Router, is the title of the host system on the network that provides a road outside the local network. In other words, the default gateway is a door helps to access from outside the network. ::. CONTACTS process the TCP / IP 's similar to sending out the parcel. If you want to send the parcel to someone who lives in the same street where you live, you can receive the package yourself. If you send a package to a person living in any other street, expulsion should go to the post office, then the post office will decide how to deliver the package to the desired party. Post office looks like default gateway Default Gateway.
The following figure shows that the ROUTER looks like a mailbox, which distributes the packages to the correct network: Form of action shows router




The following figure depicts RAAD computer sends a data packet to the chocolate. The IP protocol in RAAD analyze package address of the sent Chklath and determines that Chklath Local or apparatus for local sender RAAD device.


:: Target device or the consignee package be local when it determines that the two IP consignor and consignee appliances have the same network in the section of the IP addresses that have been allocated. If the target device Local Local IP, the need to take the network card address of the target. If a remote target machine (any other network), the IP looking at the table tracks routing table explained the way to that network. If and grandfather in the address table tracks or the way he wants the IP address takes the gateway or the address you want from a table tracks. If there is no title or by the table, of course, IP needs to take the title card default gateway default gateway. Of course the whole de autopsy will be in the next lessons.
Determine the address of the hardware or the card :: The chart below a representation of the decision process used by the TCP / IP to identify any of the hardware addresses or network card or the Mac address is required to send the package:




When assigned IP address for the host, the network manager Administrator typing the address Default gateway as part of the variables TCP / IP. Package will be sent to the default gateway for the mac address is supposed to be moving to another network. Default gateway then determines whether the target IP is one of the interfaces or cards listed him or he needs to pass the package to another Router.
Using another measure, this is like going to the airport and travel to the destination. If there is a direct route from the airport to your destination, you will use. If it did not exist a direct route will be sent via the nearest route to your destination. In the next step the IP uses ARP to get the Hardware address of the target device. The ARP here is similar to the investigator who find the hardware address of the target device based on IP address, which asks for the Internet Protocol.
This protocol translates IP address to a hardware address.
Ok, if the ARP found the IP addresses and gear in the ARP cache, the package you mean entitled gear of search is a plus. The second case, if the IP address is not in the ARP cache ARP dials the deployment of all devices.
Time is after the allocation of the address IP address gear, stored in the ARP cache for two minutes. If the IP search request again to the same IP address during these minutes, the entrance stay again in the ARP cache memory or the ARP for two more minutes. Entrance remain in the memory of the ARP a maximum of 10 minutes, after which it is pulled out of her memory.
The picture below shows the ARP cache



Memory with 3 types of data: The first column where the IP address, the second column of the Hardware address or the MAC, the third column we find the description of the state of the entrance in the ARP cache. If the entrance in the ARP cache its dynamic any variable state that in the event that the title was discovered during the process of the broadcast, and whether static or fixed if title was added manually or manually.
Aasthaddam publication to search for the hardware address or e-gear: If you do not find the ARP the IP address in the memory of the ARP, the ARP protocol begins with the so-called ARP request. Or ARP request. This request shall be published in the local network. Deployment of the ARP contains the required IP address so that the future can identify them. Also contains the hardware address of the source. After it arrives at the device or know that publishing is intended it, you place the IP address and the hardware source or sender in the memory of the ARP own. In the event that the ARP packet reached to any device, the network card outputs the packet from the packet network line and passes through the network interface layer to layer and ARP online. The ARP in the destination receiving test works for packages Leary package to device hardware address of the sender. If the request for the ARP is not so the machine rejects the package. If you found the title of the hardware followed by the sending device, the IP address and the hardware for the package source placed in the ARP cache, and ARP reply is made to the source of the package. Address of the target hardware will exist now in the ARP reply. When you reach the answer, or ARP ARP reply, the IP address and the Hardware address remain in the ARP cache for two minutes.


Important :: terms ::
IP Address Title used by Internet Protocol :: IP :: to define the network or device.
Logical Address This address can be amended, and is called by the device.
Subnet mask Variable includes any IP address exists in the network.
Router Device connecting Bin networks and shall move data packets from one network to another.
Remote Network Network on the device, which is located on the other side of the Router.
Default Gateway Be variable in the IP address of the router, and is used to pass the packet to another network.
Routing Table Table that contains the titles that suggest the best way to other networks.
Address Resolution Protocol :: ARP :: Protocol used to address translation IP address to the hardware address hardware address.
ARP cache Area in memory with the IP addresses that the newly translated addresses hardware.
ARP request Beams scattered by searching for address translation for the IP address for the hardware.
ARP reply Packages which returns to to Contact the ARP request and be containing the IP address and the hardware address who request the ARP.