Sei sulla pagina 1di 16

What are the functions of a network administrator?

 installation of a network,

 configuration of network settings,

 troubleshooting of networks

 Maintenance of network.

Networking: 2 or more devices can be connected by physical media such as coaxial cable or OFC to
communicate and sharefiles, folder and hardware devices.

 The physical media we called as link and computer it connects called as node

 Physical media shred by only 2 computers called as point to point

 Physical media shred by more than 2 computers called as multiple access(multi point).

Types of networking model:


1.peer to peer networking model

2.client server model

peer to peer networking model: client server model:


 here no computer has control over the it has server it manages security and permission of
another computer. data and work shared all the computer. And server share files and folder
between computer itself, it doesn’t have to all computer in domain. more secure.
centralized server. less secure.
Home group: Workstation:it is similar to Pc, but it is more faster
here no computer has control over another than normal pc and it can handle local
computer .it contain not more than 20 computer. information and graphical processing.
here all computer connected to same local
network.

Work group domain


 It doesn’t have centralized server to  It has centralized server to manage
manage security and permissions of all the security and permissions of all the
computer. computer.
 To use any computer in the work group  If you have user account on domain you
you must have user account on that can login to any computer in domain.
machine.  It contains 1000 of computer.
 It contain not more than 20 computer.
Types of computer network:
1.LAN 2.MAN 3.WAN

 LAN(local area network): It is located with MAN(metropolitan area network):


in the organization, it covers only 1 km multiple Lan called man, it covers area around
distance. single city.
 Lan can be used share files ,folders, it covers 100km distance.
hardware & software between computers. Man can be used in telephone offices.
 Lan can be used in building, office and WAN(wide area network):
colleges. multiple Lan and man called wan, it covers large
 speed of Lan will be 10/100/1000 mbps. geographical area. Speed of wan is 10mbps.it uses
leased line for internet access ,leased line establish
LAN TYPES: connection between users and isp.it carries voice,
1.ETHERNET , 2.TOKEN RING ,3.TOKEN video and traffic.
BUSS,4.FDDI
1.ETHERNET:
 it is used to connect multiple computer to
form Lan with protocol is used to control
the passing of information.
 It is operates in physical and data link
layer.
 It uses star or bus topology.
 Speed of the Ethernet is 10 to 100mbps
TYPES OF ETHERNET:
1.10 base 2(thin coaxial)
2.10base 5(thick coaxial)
3.10base t(twisted pair)
4.10base f(fiber optic)
2.Token ring : means token transmitted around
the n/w in the ring format.
3.Token bus : here s/m’s are connected in bus
format but the token is transmitted in ring format.
Token :it is a small packet it allows n/w devices
communicate with cable.
Packet: data unit transmitted over the network.
4.FDDI(fiber distributed data interface) : it
Responsible for high speed data transmission over
the LAN.
OSI(OPEN SYSTEM INTER CONNECTION) MODEL:

 It establishes communication b/w 2 end user on network.

7 layers in OSI model

1.Physical layer,2.Data link layer,3.Network layer,4.Transport layer,5.Session


layer,6.Presentation layer,7.Application layer

1.Physical layer: it converts data into bits.it 4.Transport layer :


uses physical media such as copper and OFC  it transport entire message from Source to
cable to transfer data from Source to Destination.it divides message into
Destination. here nic and hub is operated. manageable unit called segment.
2.Datalink layer : It converts bits into frame,  It contain protocols like tcp and udp.
it add header and trailer to the frame. Tcp: it is a connection oriented protocol, it is a set of
Frame means digital data transmission unit communication protocols used to connect hosts on
.Here Switch is operated. the network.
frame contains Source mac, Destination mac, Udp: it is a connectionless oriented protocol, it is
data, crc. used for send and receive datagram over the n/w.
Mac(media access control) : It is a physical Session layer:
address assigned to nic card to identified  it synchronizes the data during
themselves and it is a 12 digit 48 bit address. transmission, it establish and terminate the
Header and trailer are used for session.
synchronization and error control.  Synchronization: process of adding check
Header: it consist information need to send points to the stream of data.
packet from Source to Destination. It contain protocols like net bios, sap ,sip, l2pp,
Trailer:It consist user information who create pptp.
the packet.
It contains protocols like hdlc, ppp, ARP.
3.Network layer: Presentation layer:
 it converts frames into packet.  it responsible for data encryption
 It contain ip address and router to ,compression, translation.
carry packet from source to  It contain protocols like ssl.
destination.
 Here router is operated. Application layer:
it allows user to access network resources.
Packet: data unit transmitted over the And it provides services such as electronic
network. mail, remote file access etc.
NETWORKING DEVICES:

Hub : it is a central point for connecting NIC: it is used for communication b/w computer
segments in computer n/w. it is a broad and n/w.
casting device it broad cast message to all  Speed-10mbps and it is installed in pci slot.
other device on the network. It doesn’t
control the network traffic. 2 types
There are 2 types 1.active hub, 2.passive 1.Wired nic (1000 base t nic)
hub 2.Wire less nic (fiber optic nic)
 Active hub: it amplifies the signal hence
transmission length also increases.
 Passive hub: it doesn’t amplify the signal.
It just connects multiple segments in n/w.
 Switch:it is also a broad casting device, it Gateway:it is entry and exit point of the n/w.
reads the mac address. it checks Source  It allows data transfer from one n/w to
mac with Destination mac if the match is another.
found then only it forward frame to the
particular location otherwise not.it
controls the network traffic.
ports 8.16,24,48.
Types:
 1. Manageable switch: it has iOS(inter n/w
OS).it can be configure.
 2. Non manageable switch: it doesn’t have
iOS , it has cache memory.it can’t be
configure.
Router: it is a intelligent device b/c’s it select Bridge :
best path for networking. it joins small n/w like Lan
 It connects 2 diff network.
 It is a layer 3 device b/c’s it uses ip address
and mac address.
TCP/IP LAYER: it is a set of communication protocols it allows computer to access internet.

It contains diff Layers

1.Network access layer(physical and data link 3.Trasport layer : flow and error control done at
layer): it responsible for data bit conversion and this layer.
framing.  Protocols: TCP and UDP.
 Physical layer contains protocols like dsl
 Data link layer contains protocols like ppp,
hdlc.

2.Internet layer: It responsible for sending packets 4.Application layer :it allows user to access
from source to destination. network resources.it provides services such as
 It contain protocols like electronic mail and remote file access.
ip(ipv4,ipv6),IPsec , ICMP,IGMP,ARP,RARP. Protocols: It contain protocols like SMTP, SNMP,
http, ftp, DHCP, Nfs, telnet.

Diff b/w TCP & UDP:


TCP(transport control protocol) UDP(user datagram protocol)
1. Connection oriented protocol and reliable. Connection less oriented protocol&non reliable.
2.Data send sequentially data send randomly
3. More data can send. Less data can send
4.More failure & slow less failure & fast
5.protocols: http,ftp,SMTP. Protocols: DNS, void., TFTP
EX:FTP,TELNET,SSH,SMTP(sending mail), EX:VPN, Media streaming ,online games
imap/pop(receiving mail)

Protocols port number


FTP 20,21
TELNET 23
SMTP 25
DNS 53
DHCP 68 for client 67 for server
TFTP 69
HTTP 80
POP3 110
IMAP 143
SNMP 161
HTTPS 443
Protocols:it is a set of rules used for communication between network devices and computer.
different protocols:

ICMP(internet control message protocol): it is IGMP(internet group message protocol): it is used


used to send error reporting message back to the to send message to the multiple recipient
sending devices when requested service
unavailable.

SMTP(simple mail transport protocol): it is used SNMP(simple new management protocol): It is


to send a mail. used control networking devices.
POP3(post office protocol):it is used to receive IMAP(internet message access protocol): it is used
mail. to receive mail.
FTP(file transfer protocol): it is used to transfer a TFTP(trivial file transport protocol): it transfers
files b/w remote and local computer. files b/w server and client s/m. and it helps to
upload and download file.
NFS(network file system): it allows system
operates in diff OS.
HTTP(hyper terminal transport protocol): it
manages communication b/w web server and
client. HTTP or Hyper Text Transfer Protocol is
provides a set of rules to transfer files, videos,
images over the world wide web
DHCP(dynamic host configuration protocol): it TELNET(terminal network): it allows user to log on
provides ip configuration to its client remote system. It is also used to test SMTP
automatically. communication.

URL(uniform resource locater):It is a web address HTML(hyper terminal markup language): it is used
specified in the address bar of the browser.. to create static web pages.
SSH: it provides a secure channel over an
unsecured network in a client-server architecture,
connecting an SSH client application with an SSH
server.
• IP ADDRESS(internet protocol address):
• It is a unique 32 bit address. It carry packet from Source to Destination.
• It can be represented in dotted decimal format.
• It contains network and host address.
• Network address: It is used to identify the n/w.
• Host address: It is used to identify the end s/m.
• It is also called logical address.

• There are 2 types of ip address

• STATIC IP ADDRESS: It is manually provided by administrator.

• Dynamic ip address: It is automatically provided by DHCP server.

• Classes of ip address:
• There are 5 classes 1.class A, 2 class B, 3.class C, 4.class D, 5.class E

• CLASS A: • CLASS B: its range from 128-191,it


• .its range from 1-126 contain 16 bit n/w address and 16 bit
• .it contain 8 bit n/w address and 24 host address.
bit host address. • .it support 65,000 n/w and each n/w
• .it support 128 n/w and each n/w has has 16,000 host.
16 million host. • .in this 172.16.0.0 to 172.31.0.0 is
• .in this 10.0.0.0 to 10.255.255.255 is private ip address and
private ip address and
• 127.0.0.1 to 127.255.255.255 is loop .in this 169.254.1.0 to
back address used to check n/w 169.254.255.254 is a link local
devices and n/w protocols Also address or apipa (automatic private
0.0.0.0 to 0.255.255.255 is reserved ip address) it is used to provides ip
ip. address in case of DHCP fails.

• CLASS C :its range from 192-223, It • Class D: .its range from 224-239 it is
contain 32 bit n/w address and 8 bit used for multicasting.
host address. • Class E: its range from 240-255 it is
• it support 2 million n/w and each n/w used for experimental & testing
has 254 host.
• .in this 192.168.0.0 to
192.168.255.255 is private ip address
.

• Subnet mask: it divides the ip address into network and host part.
• Unicast: sending data from one sender to one receiver.
• Multicast: sending data from one sender to set of receiver.
• Broadcast : sending data from one sender to all receiver.
• Diff between IPV4 and IPV6:
IPV4 IPV6
it is a 32 bit address it is a 128 bit address
address format is dotted decimal address format is hexadecimal
it doesn't Have built in security it have built insecurity
Address types are unicast, multicast, address types are unicast, multicast,
Broadcast. any cast
it support 2^32 address it support 2^128 address.

• 1. Privateipaddress:within the organization we will use this one. Like home, office,
company

• 2. Public ip address:outside the organization we will use this one provided by the
isp.

• Trouble shooting in n/w problems:


• first we have to check cable, nic card ,led status
• .ping to the gateway if it is not successful then problem with Lan
• . ping to the external DNS server if ping is not successful then problem with wan.

• Using commands:
Ipconfig: It shows the information of current network adaptor (address, subnet mask, and
default gateway.)
Ipconfig /all: it shows the information of all network adaptor.
Ping command:It is used to check n/w connectivity between 2 hosts.
Tracert command: it shows the information of packet.
Pathping command:it shows the information of n/w loss and n/w latency.
Netstat command:it shows the information of tcp/ip protocol.
ARP command:it links ip address to mac address.
For DNS:
Nslookup: used to obtain information about Internet servers.[domain name and ip address]
Ipconfig /Flushdns: It will remove the DNS caches.
For DHCP:
Ipconfig /release: it will release all dhcp ip information.
ipconfig /renew: it will search for dhcp server and automatically gather ip configuration.

common software problems can lead to network defects:


– client server problems
– application conflicts
– error in configuration
– protocol mismatch
– security issues
– user policy and rights issues
• IPV6: it is an internet protocol it supports much larger address space than IPV4.

• .it supports class less addressing. It contains protocols likeOSPFV3, RIPNG, and EIGRP.

• Types: unicast, multicast, any cast

• ICS(internet connection sharing): it allows computer to share its internet connection to


all other computer in Lan.
• It consist DHCP allocator, DNS proxy, Nat, ics host, ics client.

• Internet: it is a public network available to everyone.

• Intranet: it is a private network available within the organization.

• TTL (time to live): it stores the DNS record. It shows the status of packet.
• The millisecond value denotes how long it took for the data to reach the destination
and come back to your local machine.

Diff b/w wired & wireless n/w


Wired n/w: wireless n/w:
It requires physical connection. It doesn’t requires physical connection
High security. low security
speed of data transmission is high speed of data transmission is low
Less interference. More interference.
Speed:1gbps Speed:54mbps
Ex:Lan Ex:wan

Securing wireless n/w:


1. Changing default password.
2. Changing default ssid(Wi-Fi name, service set identifier)
3. Enabling wpa encryption(wife protection access)
4. Enabling mac address filtering

2 types of wireless n/w:


1. Access point, 2. ad-hoc or or peer to peer n/w

1. Access point: it acts as a interface b/w wired and wireless n/w.


It transmits, receives,buffers the data b/w wired and wireless n/w.
It is operated in data link layer.
It supports 255 clients.
Extension point: it increases the range of the wireless n/w when access point not able to
cover the entire n/w.

2.Peer to peer or ad-hoc or : this n/w helps to wireless devices to communicate directly
without using access point.

Wireless router: It allows to access internet to the wireless n/w devices.

Data card or broad band: it is similar to the pen drive which provides wireless internet
facility.
Adapter: it allows computer to connect wireless LAN.

Wap(wireless access point) : it connects wired n/w nodes or wireless n/w nodes.

Wi-Fi(wlan): it provide internet facility to the wireless n/w devices.

Modem(modulation and demodulation): it converts digital to analog and


analog to digital signal transmitting over the telephone line to the computer
2 types

1. Dsl (digital subscriber line): here downloading and uploading speed is same.

2. Adsl(asymmetric dsl): here downloading speed is greater than uploading speed.

VOIP (Voice Over Internet Protocol):it is a hardware and software that enables
People to use the Internet as the transmission medium for telephone calls.

SIP (Session Initiation Protocol) : it is a protocol used in VoIP communications allowing


users to make voice and video calls over the internet around the world.

Requirements:

Sip user id, domain name and password

Proxy server: it is a computer that acts as a gateway between a local network and a
public network such as the Internet. Proxy servers provide increased performance and
security.
VPN (virtual private network):VPN is designed to provide a secure, encrypted tunnel in
which to transmit the data between the remote user and the company network.

It connects remote sites and user together using public network or internet.

1. Remote access vpn: it can be used in home or office.

2. Site to site vpn: It can be used b/w 2 office.

Types:

.private vpn, external vpn ,internal vpn

• Tunneling mean:
• secure movement of data from one network to another network

• Layer Two Tunneling Protocol (L2TP)

• Point-to-Point Tunneling Protocol (PPTP)

• Layer Two Tunneling Protocol (L2TP):Layer 2 Tunnel Protocol is a VPN protocol that
doesn’t offer any encryption. That’s why it’s usually implemented along with IPsec
encryption.

• It provides high security, fastest speed

• Point-to-Point Tunneling Protocol (PPTP): it is a light weight vpn protocol it provide


basic security and medium speed .it requires username ,password, server address we
can easily setup .

• It doesn’t offer encryption.

• It is inbuilt in all the latest operating system. And it is most widely used vpn for windows
users

• Virtual LAN (VLAN) :it is used to separate ports in to different Lan on physical switch.
• is a group of networking devices in the same broadcast domain.
• .it reduces network traffic. Same VLAN will not communicate but different VLAN will
communicate.
• It is a Logicalgroup of networking devices over physical connection.
• .VLAN1 is default VLAN but 1002,1003,1004,1005 –un supported VLAN 2-1001-supported VLAN
Firewall: it acts as a protective barrier between Lan and wan. It protects your
system from network hacker and malicious software.it carefully analyzes data
entering and exiting of network. it prevents hackers can take control of your system
remotely and steal your data or important information from system. For a single PC
you may need a software firewall and large corporate implements hardware firewall to
protect all of their systems from such attacks.

Hardware firewall Software firewall


It is connected between Routers and ISP It is installed on each computers
Easier to maintain and administer than SF Difficult to maintain and administer
Difficult to install and configure Easy to install and configure
It includes vpn support, antivirus, anti- It includes only antivirus, and application
spam, antispyware, web filtering, filtering.
application filtering.
We can configure DNS, DHCP, static and We can’t configure DNS, DHCP, static and
dynamic routing. dynamic routing.
Ex: Fort iGATE, Cisco PIX, Juniper SSG, Ex: Zone Alarm, Windows Firewall, Norton
Sonic wall, Cyberoam, D-Link 360, Kaspersky, Avast , Comodo

Antivirus: it is used to protect system from computer viruses.


Cross over and straight over cable:

Cross over cable Straight over cable


White orange White green

Orange Green
White green White orange
Blue
Blue
White blue
White blue
green
Orange
White brown
White brown
Brown
brown
Pc-pc

Hub-hub Pc-switch

Switch-switch Switch-hub
Router –router(serial cable) Hub-router

Router-switch

Pc-hub

Router-pc(cross cable for communication,


console cable for configuration)
TOPOLOGY: Graphical arrangement of networking devices.
Types: bus, star, ring, mesh, tree, hybrid.

Bus: here all devices are connected to common Mesh: each computer is connected to all other
cable called backbone cable. computer.
.It consist terminator to remove unsent data. .Complex networking design.
. Easy to design and inexpensive.
Star:here all devices are connected to central hub. Tree: it is combination of bus and star topology.
Ring: here all devices are connected to central hub Hybrid: it is combination of all topology.
.data flow in only one direction.

OS(operating system): it is a interface between user and computer.it is system software


consisting programs that are loading while booting the system. User interact with computer
and application through os.

There are 2 types of os

Network os client os
Windows server 2000 windows vista
Windows server 2003 windows XP
Windows server 2008r2 windows 7
Unix
Linux

Installation Method:

1. Clean: it can be used for new system

2. Upgrade: if we upgrade from old os to new os we can retain all settings, files and applications
as previous version of windows.

3. Dual boot: we can install os in side by side in same system.

What is the main component of operating system?

 Main component of operating system are kernel and shell.

 Shell is a interface between application program and kernel drivers .thus we can say

 kernel is an interface between hardware and shell.


partition: divides the hdd in to multiple logical storage units

bit locker:it is a drive encryption method which is used to protect computer from offline
attackers.

What to Monitor?

 As stated earlier, the resources present in every system are CPU power, bandwidth,
memory, and storage

MS outlook configuration:outlook is Email software from Microsoft that enables user to


send & receive emails on their systems.

Email address, username, password, incoming server, outgoing server and port numbers of
incoming and outgoing servers.

Microsoft outlook .pst(personal storage file)


location:C:\Users\ramesh.r\AppData\Local\Microsoft\Outlook

Microsoft outlook express .dbx location:C:\Users\ramesh.r\AppData\Local\identity\Outlook express

Diff b/w ms outlook and ms outlook express:

MS Outlook outlook express


It comes with ms office product it is doesn’t comes with MS office product we
need to download do
It can be used in large network It can be used in small network
It is a corporate user it is home user
Here files will be stored in .pst(personal storage Here files will be stored in .dbx(database
files) extension)
It has features like calendar, contacts &address it doesn’t have any feature
book ,task management.

To repair pst use path c:\programfiles\msoffice\office14 selectscanpst.exe browse


pst file and scan it

In Outlook 2003 and Outlook 2007, the maximum size of pst-file has been limited to 20GB. In
Outlook 2010, 2013 and 2016, this limit has been set to 50GB.
Printer:

Adding local printer:Control Panel\Hardware and Sound\Devices and Printers\add printer\select


local printer\select port USB\LPT (LPT (line print terminal) is the usual designation for
a parallel port connection to a printer) depend up on manufacturer \select manufacturer and
model\select have a disk browse folder where printer driver located install it then click finish.

Adding network\wireless\blue tooth printer:Control Panel\Hardware and Sound\Devices and


Printers\add printer\local printer\create new port\select standard tcp\ip port\enter ip address of
the printer give port name whatever you want\select manufacturer and model\select have a disk
browse folder where printer driver located install it then click finish.

Sharing printer: go to printer properties\share this printer \give share name whatever you want\go
to Control Panel\All Control Panel Items\Network and Sharing Center\Advanced sharing
settings\select turn on network discovery & files and printer sharing done.

How to find out network printer ip address: right click on printer \printer properties\ports scroll
down there you can see ip address of printer.

Potrebbero piacerti anche