Monday, 31 March 2014

List of Different Vendors of ROUTERS

List of Different Vendors of ROUTERS
·      
                 

       ·         Allied Telesis
       ·         Alcatel-Lucent
                                                       ·         Avaya - acquired Nortel

·         AVM
·         Brocade - acquired Vyatta
·         Cisco Systems
·         Dell - acquired Force10
·         D-Link
·         Enterasys - acquired by Extreme Networks
·         HP - acquired 3Com
·         Huawei
·         Juniper Networks
·         Meraki
     ·         Rad Data Communications
     ·         Telco Systems
     ·         Ubiquiti
     ·         ZyXEL

                                        ·         ZTE
PING
What is ping ?

Why to use PING ?

Syntax of PING ?

Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. The name comes from active sonar terminology which sends a pulse of sound and listens for the echo to detect objects underwater.
Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP response. In the process it measures the time from transmission to reception (round-trip time) and records any packet loss. The results of the test are printed in the form of a statistical summary of the response packets received, including the minimum, maximum, and the mean round-trip times, and sometimes the standard deviation of the mean.
Depending on actual implementation, the ping utility may be executed with various command-line switches to enable special operational modes. For example, options include specifying the packet size of the probe, automatic repeated operation for sending a specified count of probes, and time stamping.
Many operating systems provide a companion utility, ping6, for probing Internet Protocol version 6 (IPv6) hosts, but some systems may include this capability in ping.
Ping may be abused as a simple form of denial-of-service attack in the form of a ping flood, in which the attacker overwhelms the victim with ICMP echo request packets.
History
The ping utility was authored by Mike Muuss in December 1983 as a tool to troubleshoot problems in an IP network. He was inspired by a remark by David Mills on using ICMP echo packets for IP network diagnosis and measurements. Mike named it after the sound that sonar makes, since its methodology is similar to sonar's echo location.
Host discovery or ping scanning or ping sweep is a feature of network scanning tools, such as nmap.
RFC 1122 prescribes that any host must process an echo-request and issue an echo-reply in return This has been characterized as a security risk.
Sample ping test
The following is the output of running ping with the target www.example.com for five probes.

Syntax :Type ping <hostname> or ping <IP address>.

The utility summarizes its results after completing the ping probes. The shortest round trip time was 9.674 ms, the average was 10.968 ms, and the maximum value was 11.726 ms. The measurement had a standard deviation of 0.748 ms.
Message format
ICMP packet
IP Datagram

Bits 0–7
Bits 8–15
Bits 16–23
Bits 24–31
IP Header
(20 bytes)
Version/IHL
Type of service
Length
Identification
flags and offset
Time To Live (TTL)
Protocol
Checksum
Source IP address
Destination IP address
ICMP Header
(8 bytes)
Type of message
Code
Checksum
Header Data
ICMP Payload
(optional)
Payload Data

Generic composition of an ICMP 32-byte packet:[6]
·         IP Header (in blue):  Protocol set to 1 (ICMP) and Type of Service set to 0.
·         ICMP Header (in red): Type of ICMP message (8 bits)
Code (8 bits)
Checksum (16 bits), calculated with the ICMP part of the packet (the IP header is not used). It is the 16-bit one's complement of the one's complement sum of the ICMP message starting with the Type field[7]
Header Data (32 bits) field, which in this case (ICMP echo request and replies), will be composed of identifier (16 bits) and sequence number (16 bits).
ICMP Payload
Payload for the different kind of answers; can be an arbitrary length, left to implementation detail. However, the packet including IP and ICMP headers must be less than the maximum transmission unit of the network or risk being fragmented.
Data Transportation
Echo request
The echo request ("ping") is an ICMP message whose data is expected to be received back in an echo reply ("pong"). The host must respond to all echo requests with an echo reply containing the exact data received in the request message.
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Type = 8
Code = 0
Header Checksum
Identifier
Sequence Number
Data

The Identifier and Sequence Number can be used by the client to match the reply with the request that caused the reply. In practice, most Linux systems use a unique identifier for every ping process, and sequence number is an increasing number within that process. Windows uses a fixed identifier, which varies between Windows versions, and a sequence number that is only reset at boot time.
The data received in the Echo Request must be entirely included in the Echo Reply.
Echo reply
The echo reply ("pong") is an ICMP message generated in response to an echo request, and is mandatory for all hosts and routers.

00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Type = 0
Code = 0
Header Checksum
Identifier
Sequence Number
Data

Type and code must be set to 0.
The identifier and sequence number can be used by the client to determine which echo requests are associated with the echo replies.
The data received in the echo request must be entirely included in the echo reply.
Possible reply messages include the following:
H, !N, or !P – host, network or protocol unreachable
S – source route failed
F – fragmentation needed
U or !W – destination network/host unknown
I – source host is isolated
A – communication with destination network administratively prohibited
Z – communication with destination host administratively prohibited
Q – for this ToS the destination network is unreachable
T – for this ToS the destination host is unreachable
X – communication administratively prohibited
V – host precedence violation
C – precedence cutoff in effect.


Sunday, 30 March 2014

A Detail Explanation of PORT NUMBERS..



Port number

A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. For the Transmission Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header appended to a message unit. This port number is passed logically between client and server transport layers and physically between the transport layer and the Internet Protocol layer and forwarded on.
For example, a request from a client (perhaps on behalf of you at your PC) to a server on the Internet may request a file be served from that host's File Transfer Protocol (FTP) server or process. In order to pass your request to the FTP process in the remote server, the Transmission Control Protocol (TCP) software layer in your computer identifies the port number of 21 (which by convention is associated with an FTP request) in the 16-bit port number integer that is appended to your request. At the server, the TCP layer will read the port number of 21 and forward your request to the FTP program at the server.
Some services or processes have conventionally assigned permanent port numbers. These are known as well-known port numbers. In other cases, a port number is assigned temporarily (for the duration of the request and its completion) from a range of assigned port numbers. This is called an ephemeral port number.
 Port numbers are assigned in various ways, based on three ranges:
 System Ports / Well-Known Ports (0-1023)
 User Ports / Registered Ports (1024-49151) and
 Dynamic Ports / Private  Ports (49152-65535)

Well-known port number

The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). Each kind of application has a designated (and thus "well-known") port number. For example, a remote job entry application has the port number of 5; the Hypertext Transfer Protocol (HTTP) application has the port number of 80; and the Post Office Protocol Version 3 (POP3) application, commonly used for e-mail delivery, has the port number of 110. When one application communicates with another application at another host computer on the Internet, it specifies that application in each data transmission by using its port number.
The well-known ports cover the range of possible port numbers from 0 through 1023. The registered ports are numbered from 1024 through 49151. The remaining ports, referred to as dynamic ports or private ports, are numbered from 49152 through 65535.
On most systems, a well-known port number can only be used by a system (root) process or by a program run by a privileged user.

Registered port numbers

The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). In most cases, these applications run as ordinary programs that can be started by non privileged users. The registered port numbers are in the range from 1024 through 49151. They follow in sequence the well-known port numbers, which are, in most cases, applications that can only be started by privileged users, such as the Hypertext Transfer Protocol (HTTP) and Post Office Protocol Version 3 (POP3) applications. When one application communicates with another application at another host computer on the Internet, it specifies that application in each data transmission by using its port number.
Examples of applications with registered port numbers include Sun's NEO Object Request Broker (port numbers 1047 and 1048) and Shockwave (port number 1626). Besides the well-known port numbers and the registered port numbers, the remaining ports in the port number spectrum are referred to as dynamic ports or private ports and are numbered from 49152 through 65535.
Dynamic port numbers or Private port numbers

The dynamic port numbers (also known as the private port numbers) are the port numbers that are available for use by any application to use in communicating with any other application, using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). When one application communicates with another application at another host computer on the Internet, it specifies that application in each data transmission by using its port number. The port numbers range from 0 through 65535. However, certain port numbers - the well-known port numbers and the registered port numbers - are registered and administered by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by certain classes of applications. The dynamic port numbers are in the highest range, from 49152 through 65535.

Wednesday, 26 March 2014

These are some pretty IMPORTANT things..That you MUST KNOW..



These are some pretty IMPORTANT things..That you MUST KNOW..  

What they do ?
Who they are ?

Internet Engineering Task Force -IETF
The Internet Engineering Task Force (IETF) is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual. The IETF Mission Statement is documented RFC3935.


Internet Corporation for Assigned Names and Numbers –ICANN
To reach another person on the Internet you have to type an address into your computer -- a name or a number. That address must be unique so computers know where to find each other. ICANN coordinates these unique identifiers across the world. Without that coordination, we wouldn't have one global Internet.
In more technical terms, the Internet Corporation for Assigned Names and Numbers (ICANN) coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Internet's underlying address book, the Domain Name System (DNS). The IANA functions include: (1) the coordination of the assignment of technical protocol parameters including the management of the address and routing parameter area (ARPA) top-level domain; (2) the administration of certain responsibilities associated with Internet DNS root zone management such as generic (gTLD) and country code (ccTLD) Top-Level Domains; (3) the allocation of Internet numbering resources; and (4) other services. ICANN performs the IANA functions under a U.S. Government contract.



Internet Assigned Numbers Authority-IANA
The Internet Assigned Numbers Authority (IANA) is a department of ICANN responsible for coordinating some of the key elements that keep the Internet running smoothly. Whilst the Internet is renowned for being a worldwide network free from central coordination, there is a technical need for some key parts of the Internet to be globally coordinated, and this coordination role is undertaken by IANA.
Specifically, IANA allocates and maintains unique codes and numbering systems that are used in the technical standards (“protocols”) that drive the Internet.
IANA’s various activities can be broadly grouped in to three categories:


Internet Architecture Board -IAB
The IAB is chartered both as a committee of the Internet Engineering Task Force (IETF) and as an advisory body of the Internet Society (ISOC). Its responsibilities include architectural oversight of IETF activities, Internet Standards Process oversight and appeal, and the appointment of the RFC Editor. The IAB is also responsible for the management of the IETF protocol parameter registries.



The Internet Research Task Force (IRTF)
The Internet Research Task Force (IRTF) promotes research of importance to the evolution of the Internet by creating focused, long-term Research Groups working on topics related to Internet protocols, applications, architecture and technology.




                                 Internet Society
The Internet Society engages in a wide spectrum of Internet issues, including policy, governance, technology, and development. We establish and promote principles that are intended to persuade governments to make decisions that are right for their citizens and each nation’s future. Everything we do is based on ensuring that a healthy, sustainable Internet is available to everyone – today and for the next                                                              billion users

Source :  
1.       http://www.ietf.org/
2.       http://www.icann.org/
3.        http://www.iana.org/
4.       http://www.iab.org/
5.       http://irtf.org/