Escolar Documentos
Profissional Documentos
Cultura Documentos
Class: 1 (Theory)
Introduction of Network
Difference between Internet and Intranet
Types of Network Communication
Components of Network
Class: 2 (Practical)
Define OSI Model
Types of OSI Model
Class: 3 (Theory)
Types of Topology
Define IP Address
Define subnet mask
Class: 4 (Practical)
Types of Cables
Crimping Cabling works
Class: 5 (Theory)
LAN & WAN infra structure devices
Class: 6 (Practical)
Connection between two systems
Or
System to System connection
Or
Peer to Peer connection
Or
Pan Connection (Person Area Connection)
Class: 7 (Theory)
Define Switch
Define Hub
How Switch and Hubs are working
Class: 8 (Practical)
Connection between more than two systems by using switch
Class: 9 (Theory)
Define Server
Define Client
Class: 10 (Practical)
Network between Server with Client Access by using Switch
Or
System to System connection
Printer Sharing Configuration
Components of Network:
1) Host or PC
2) NIC (Network Interface Card)
3) NIC Driver Software
4) Cables & Connection or Jacks
5) Network O/S or Desktop O/S
6) Inter connecting devices like Switches, Hubs & Routers
Class: 2 (Practical)
OSI MODEL
The upper layers focus on user applications and how files are
represented on the computers prior to transport.
2) Lower layer:
7. APPLICATION LAYER:
7) Application Layer:
Classification of Applications:
Computer applications
Network applications
Internet work applications
Examples:
Telnet, FTP, HTTP, WWW Browsers, SMTP, POP, TFTP
6. PRESENTATION LAYER
6) Presentation Layer:
Examples:
5. SESSION LAYER
5) Session Layer:
Examples:
SQL, RPC, ASP, WINSOCK
4. TRANSPORT LAYER
4) Transport Layer:
Examples:
TCP, UDP
3. NETWORK LAYER
3) Network Layer:
This layer works closely with layer 2 to translate data packets from
a logical address (similar to an IP address) into hardware based
MAC addresses
Physical Layer and Data Link Layer, work very closely together to
ensure data transfer across the physical network.
Examples:
1. PHYSICAL LAYER
1) Physical Layer:
It is responsible for defining the mechanical and electrical
specifications for the transmission medium within a connection, as
well as the transformation or encoding of data into “bits”
Examples:
Token Ring, Hubs, Repeaters, RJ-45, Ethernet
Class: 3 (Theory)
Types of Topology:
1. Star network topology
2. Bus network topology
3. Circle or ring network topology
4. Tree network topology
5. Mesh network topology
6. Interconnected ring network topology
7. Loop network topology
8. Y – type network topology
2 Addresses:
1) MAC Address
2) IP Address
2) IP Address:
Sub netting:
Coaxial Cable:
Wire Coloring:
1 Orange
2 White Orange
3 Blue
4 White Blue
5 Brown
6 White Brown
7 Green
8 White Green
Straight cabling:
Host to Switch or Hub, Router to Switch or Hub
One Side 12345678
Another Side 12345678
Cross cabling:
Host to Host, Switch to Switch, Hub to Hub, Hub to Switch,
Router direct to Host
One side 12345678
Another side 36145278
LAN Infrastructure:
1. Repeaters
• Regenerate the signals
2. Bridges
• Bridge is used to reduce the broadcast domain
3. Hubs
• Hubs connect all computer LAN connections into one
device. They are nothing more than multiport repeaters.
Hubs cannot determine destinations; they merely
transmit to every line attached in a half-duplex mode
4. Switches
• Switches connect all computer LAN connections, the
same as hubs do. The difference is that switches can run
in full-duplex mode and are able to direct and filter
information to and from specific destinations
WAN Infrastructure:
1. Router
• Router are used to connect different network
2. ATM Switch
• ATM Switches provide high-speed transfer between
both LANs and WANs
3. Modem
• Modems convert digital and analog signals
4. Communication Server
• Communication Servers are typically dialed in/out
servers that allow users to dial in from remote locations
and attach to the LAN
5. Gateway
• IP to IPX
• IPX to IP
Class: 6(Practical)
System to System connection or Peer to Peer connection
Step: 1
Solution:
Step: 2
Solution:
Step: 3
3) Check the Driver CDS are updated or not for both systems
Solution:
Solution:
Step: 5
Solution:
Step: 6
Solution:
Step: 7
Solution:
Solution:
Step: 9
9) Set the System name for both systems (Restart the systems)
Solution:
Step: 11
Solution:
Step: 12
Solution:
USAGE:
ipconfig [/? | /all | /renew [adapter] | /release [adapter] |
/flushdns | /displaydns | /registerdns |
/showclassid adapter |
/setclassid adapter [classid] ]
Examples:
> ipconfig ... Show information.
> ipconfig /all ... Show detailed information
> ipconfig /renew ... renew all adapters
> ipconfig /renew EL* ... renew any connection that has its
Name starting with EL
> ipconfig /release *Con* ... release all matching connections,
Eg. "Local Area Connection 1" or
"Local Area Connection 2"
Step: 13
Solution:
Eg:
C:\> Ping /?
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] <target_name>
Step: 14
Solution:
Create one Folder for Sharing then Right Click Sharing and
Security Click if you understand the risk but still want to
share the root of the drive, click here Click Network Sharing
and Security Tick Share this Folder on Network Type
Share name Tick Allow Network users to Change my Files
Apply Ok
Step: 15
Solution:
Eg:
8 Port switch
Full duplex
1 broadcast domain
8 separate collision domain
Define Hub
A Hub is a new network device that is used for connecting
computers on a local area network
Hub is a layer 1 device
Eg:
8 Port Hubs
Half duplex
1 Broad cast domain
1 collision domain
Class: 8 (Practical)
Connection between more than two systems by using switch:
Network Models:
Define Server:
1) File Server
2) Print Server
3) Application Server (IIS, ASP.NET)
4) Mail Server (POP3, SMTP)
5) Terminal Server
6) Remote Access/ VPN Server
7) Active Directory Server
8) Domain Name Server
9) Dynamic Host Configuration Protocol Server
10) WINS Server
Eg Server O/S:
Define Client:
Eg Client O/S:
Or
2) Domain Based Network:
High Configuration
Administrator can give restriction to all systems, which
connected to server
In that Server system Server O/s Installed
Processor in server or server capability depends on clients
Centralized Logon
Third Category O/S
Must License in each client
Easy to backup data
High Security
Can go by using proper id, password
High Expensive (Server can choosing the Network)
Depends on cost and security
Or
Class: 10 (Practical)
Check Box:
User must change password at next logon
User cannot change Password
Password Never Expires
Account is disabled
Create Close
Complexity:
It has characters, special symbol and numbers combination
Or
Note:
From that call time both are in net meeting
5. User Account Local Security Policy Editing for Password
Used to Set the Password Security and Account Policy Security
Setting
Telnet uses the Telnet protocol (part of the TCP/IP protocol suite)
to connect to a remote computer over a network. Telnet Client
software allows a computer to connect to a remote Telnet server
and run applications on that server
Telnet Configuration:
First create one User Name with Password
Start Control panel Administrative Tools Services
Open Telnet Right Click Properties Startup Type
Select Automatic Apply Ok
Telnet Right click Start click Close
Welcome to Telnet
Enter the user Name : < User Name>
Enter the Password : <Password>
7. Remote Assistance
It is similar to net meeting we can view the server computers work
in client system as well as clients work in server.
Refresh:
Start Run cmd gpupdate /force Enter Exit
1) Computer Configuration
Computer Configuration settings can affect the total computer
2) Computer Configuration
User Configuration can affect only that particular user
9. Backup and Restore
Backup Tools
1) Nt Backup utility
2) Veritas
3) Backup files are stored as media files
Steps for Configure Backup:
Click Finish
Networking concepts Questions:
2. What is subnet?
A generic term for section of a large networks usually
separated by a bridge or router.
5. What is RAID?
A method for providing fault tolerance by using multiple hard
disk drives
6. What is router?
Hybrid devices that combine the features of both bridges and
routers
8. What is ICMP?
ICMP is Internet Control Message Protocol, a network layer
protocol of the TCP/IP suite used by hosts and gateways to send
notification of datagram problems back to the sender. It uses the
echo test / reply to test whether a destination is reachable and
responding. It also handles both control and error messages
9. What is the range of addresses in the classes of internet
addresses?
Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 247.255.255.255
12. Why should you care about the OSI Reference Model?
It provides a framework for discussing network operations
and design