Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
installation of a network,
troubleshooting of networks
Maintenance of network.
Networking: 2 or more devices can be connected by physical media such as coaxial cable or OFC to
communicate and sharefiles, folder and hardware devices.
The physical media we called as link and computer it connects called as node
Physical media shred by more than 2 computers called as multiple access(multi point).
Hub : it is a central point for connecting NIC: it is used for communication b/w computer
segments in computer n/w. it is a broad and n/w.
casting device it broad cast message to all Speed-10mbps and it is installed in pci slot.
other device on the network. It doesn’t
control the network traffic. 2 types
There are 2 types 1.active hub, 2.passive 1.Wired nic (1000 base t nic)
hub 2.Wire less nic (fiber optic nic)
Active hub: it amplifies the signal hence
transmission length also increases.
Passive hub: it doesn’t amplify the signal.
It just connects multiple segments in n/w.
Switch:it is also a broad casting device, it Gateway:it is entry and exit point of the n/w.
reads the mac address. it checks Source It allows data transfer from one n/w to
mac with Destination mac if the match is another.
found then only it forward frame to the
particular location otherwise not.it
controls the network traffic.
ports 8.16,24,48.
Types:
1. Manageable switch: it has iOS(inter n/w
OS).it can be configure.
2. Non manageable switch: it doesn’t have
iOS , it has cache memory.it can’t be
configure.
Router: it is a intelligent device b/c’s it select Bridge :
best path for networking. it joins small n/w like Lan
It connects 2 diff network.
It is a layer 3 device b/c’s it uses ip address
and mac address.
TCP/IP LAYER: it is a set of communication protocols it allows computer to access internet.
1.Network access layer(physical and data link 3.Trasport layer : flow and error control done at
layer): it responsible for data bit conversion and this layer.
framing. Protocols: TCP and UDP.
Physical layer contains protocols like dsl
Data link layer contains protocols like ppp,
hdlc.
2.Internet layer: It responsible for sending packets 4.Application layer :it allows user to access
from source to destination. network resources.it provides services such as
It contain protocols like electronic mail and remote file access.
ip(ipv4,ipv6),IPsec , ICMP,IGMP,ARP,RARP. Protocols: It contain protocols like SMTP, SNMP,
http, ftp, DHCP, Nfs, telnet.
URL(uniform resource locater):It is a web address HTML(hyper terminal markup language): it is used
specified in the address bar of the browser.. to create static web pages.
SSH: it provides a secure channel over an
unsecured network in a client-server architecture,
connecting an SSH client application with an SSH
server.
• IP ADDRESS(internet protocol address):
• It is a unique 32 bit address. It carry packet from Source to Destination.
• It can be represented in dotted decimal format.
• It contains network and host address.
• Network address: It is used to identify the n/w.
• Host address: It is used to identify the end s/m.
• It is also called logical address.
• Classes of ip address:
• There are 5 classes 1.class A, 2 class B, 3.class C, 4.class D, 5.class E
• CLASS C :its range from 192-223, It • Class D: .its range from 224-239 it is
contain 32 bit n/w address and 8 bit used for multicasting.
host address. • Class E: its range from 240-255 it is
• it support 2 million n/w and each n/w used for experimental & testing
has 254 host.
• .in this 192.168.0.0 to
192.168.255.255 is private ip address
.
• Subnet mask: it divides the ip address into network and host part.
• Unicast: sending data from one sender to one receiver.
• Multicast: sending data from one sender to set of receiver.
• Broadcast : sending data from one sender to all receiver.
• Diff between IPV4 and IPV6:
IPV4 IPV6
it is a 32 bit address it is a 128 bit address
address format is dotted decimal address format is hexadecimal
it doesn't Have built in security it have built insecurity
Address types are unicast, multicast, address types are unicast, multicast,
Broadcast. any cast
it support 2^32 address it support 2^128 address.
• 1. Privateipaddress:within the organization we will use this one. Like home, office,
company
• 2. Public ip address:outside the organization we will use this one provided by the
isp.
• Using commands:
Ipconfig: It shows the information of current network adaptor (address, subnet mask, and
default gateway.)
Ipconfig /all: it shows the information of all network adaptor.
Ping command:It is used to check n/w connectivity between 2 hosts.
Tracert command: it shows the information of packet.
Pathping command:it shows the information of n/w loss and n/w latency.
Netstat command:it shows the information of tcp/ip protocol.
ARP command:it links ip address to mac address.
For DNS:
Nslookup: used to obtain information about Internet servers.[domain name and ip address]
Ipconfig /Flushdns: It will remove the DNS caches.
For DHCP:
Ipconfig /release: it will release all dhcp ip information.
ipconfig /renew: it will search for dhcp server and automatically gather ip configuration.
• TTL (time to live): it stores the DNS record. It shows the status of packet.
• The millisecond value denotes how long it took for the data to reach the destination
and come back to your local machine.
2.Peer to peer or ad-hoc or : this n/w helps to wireless devices to communicate directly
without using access point.
Data card or broad band: it is similar to the pen drive which provides wireless internet
facility.
Adapter: it allows computer to connect wireless LAN.
Wap(wireless access point) : it connects wired n/w nodes or wireless n/w nodes.
1. Dsl (digital subscriber line): here downloading and uploading speed is same.
VOIP (Voice Over Internet Protocol):it is a hardware and software that enables
People to use the Internet as the transmission medium for telephone calls.
Requirements:
Proxy server: it is a computer that acts as a gateway between a local network and a
public network such as the Internet. Proxy servers provide increased performance and
security.
VPN (virtual private network):VPN is designed to provide a secure, encrypted tunnel in
which to transmit the data between the remote user and the company network.
It connects remote sites and user together using public network or internet.
Types:
• Tunneling mean:
• secure movement of data from one network to another network
• Layer Two Tunneling Protocol (L2TP):Layer 2 Tunnel Protocol is a VPN protocol that
doesn’t offer any encryption. That’s why it’s usually implemented along with IPsec
encryption.
• It is inbuilt in all the latest operating system. And it is most widely used vpn for windows
users
• Virtual LAN (VLAN) :it is used to separate ports in to different Lan on physical switch.
• is a group of networking devices in the same broadcast domain.
• .it reduces network traffic. Same VLAN will not communicate but different VLAN will
communicate.
• It is a Logicalgroup of networking devices over physical connection.
• .VLAN1 is default VLAN but 1002,1003,1004,1005 –un supported VLAN 2-1001-supported VLAN
Firewall: it acts as a protective barrier between Lan and wan. It protects your
system from network hacker and malicious software.it carefully analyzes data
entering and exiting of network. it prevents hackers can take control of your system
remotely and steal your data or important information from system. For a single PC
you may need a software firewall and large corporate implements hardware firewall to
protect all of their systems from such attacks.
Orange Green
White green White orange
Blue
Blue
White blue
White blue
green
Orange
White brown
White brown
Brown
brown
Pc-pc
Hub-hub Pc-switch
Switch-switch Switch-hub
Router –router(serial cable) Hub-router
Router-switch
Pc-hub
Bus: here all devices are connected to common Mesh: each computer is connected to all other
cable called backbone cable. computer.
.It consist terminator to remove unsent data. .Complex networking design.
. Easy to design and inexpensive.
Star:here all devices are connected to central hub. Tree: it is combination of bus and star topology.
Ring: here all devices are connected to central hub Hybrid: it is combination of all topology.
.data flow in only one direction.
Network os client os
Windows server 2000 windows vista
Windows server 2003 windows XP
Windows server 2008r2 windows 7
Unix
Linux
Installation Method:
2. Upgrade: if we upgrade from old os to new os we can retain all settings, files and applications
as previous version of windows.
Shell is a interface between application program and kernel drivers .thus we can say
bit locker:it is a drive encryption method which is used to protect computer from offline
attackers.
What to Monitor?
As stated earlier, the resources present in every system are CPU power, bandwidth,
memory, and storage
Email address, username, password, incoming server, outgoing server and port numbers of
incoming and outgoing servers.
In Outlook 2003 and Outlook 2007, the maximum size of pst-file has been limited to 20GB. In
Outlook 2010, 2013 and 2016, this limit has been set to 50GB.
Printer:
Sharing printer: go to printer properties\share this printer \give share name whatever you want\go
to Control Panel\All Control Panel Items\Network and Sharing Center\Advanced sharing
settings\select turn on network discovery & files and printer sharing done.
How to find out network printer ip address: right click on printer \printer properties\ports scroll
down there you can see ip address of printer.