Você está na página 1de 43

Networking Syllabus 25 Hours

Class: 1 (Theory)
Introduction of Network
Difference between Internet and Intranet
Types of Network Communication
Components of Network

Class: 2 (Practical)
Define OSI Model
Types of OSI Model

Class: 3 (Theory)
Types of Topology
Define IP Address
Define subnet mask

Class: 4 (Practical)
Types of Cables
Crimping Cabling works

Class: 5 (Theory)
LAN & WAN infra structure devices

Class: 6 (Practical)
Connection between two systems
Or
System to System connection
Or
Peer to Peer connection
Or
Pan Connection (Person Area Connection)

Class: 7 (Theory)
Define Switch
Define Hub
How Switch and Hubs are working
Class: 8 (Practical)
Connection between more than two systems by using switch

Class: 9 (Theory)
Define Server
Define Client

Class: 10 (Practical)
Network between Server with Client Access by using Switch
Or
System to System connection
Printer Sharing Configuration

ADDITION CONCEPT FOR NETWORKING

1. User Account Creation in Workgroup


2. User Creation in Domain
3. Domain Security Policy Editing
4. Remote Desktop connection
5. Net Meeting
6. Telnet Protocol
7. Remote Assistance
8. Group Policy Editing
9. Backup and Restore
10. Network Mapping
Class: 1 (Theory)
Introduction of Network:
A network is a collection of computers, printers, routers, switches,
and other devices that are able to communicate with each other
over some transmission media

Network can be connecting two types:


1) With wire connection (EG:- NETWORK CABLE)
2) Without wire connection (EG:- WIFI, BLUETOOTH)

Difference between Internet and Intranet:


Internet:
Connection with outside the area
Intranet:
Connection with inside the area

3 Types of Network Communication:

1) Unicast Communication ( Single to Single Communication)


2) Multicast Communication (Single to Groups
Communication)
3) Broadcast Communication (Single to Many Communication)

Components of Network:
1) Host or PC
2) NIC (Network Interface Card)
3) NIC Driver Software
4) Cables & Connection or Jacks
5) Network O/S or Desktop O/S
6) Inter connecting devices like Switches, Hubs & Routers
Class: 2 (Practical)
OSI MODEL

Introduction to OSI Model:


Developed by ISO (International Standard Organization) in 1970
There are 7 layers in the OSI model
Each layer is responsible for a particular aspect of data
communication
For example, one layer may be responsible for establishing
connections between devices, while another layer may be
responsible for error checking during transfer

OSI model are divided into two groups:


1) Upper layer:

The upper layers focus on user applications and how files are
represented on the computers prior to transport.

2) Lower layer:

For the most part, network engineers are more concerned


with the lower layers. It's the lower layers that concentrate on
how the communication across a network actually occurs.

ALL People Seem to Need Data Processing (Layer 7 to 1)


Please Do Not Take Sausage Pizzas Away (Layer 1 to 7)

Befits of OSI Model:

Easy Trouble shooting


Multiple Vendors can work together
Diagram of OSI Model Layer:

(APSTNDP) Lower to upper

7. APPLICATION LAYER:

7) Application Layer:

The Application Layer is the highest layer in the protocol stack

Classification of Applications:

Computer applications
Network applications
Internet work applications

Examples:
Telnet, FTP, HTTP, WWW Browsers, SMTP, POP, TFTP
6. PRESENTATION LAYER

6) Presentation Layer:

The Presentation Layer manipulates the representation of data for


transfer to applications on different devices

The Presentation Layer is responsible for the following


services:
Data representation
Data security
Data compression

Examples:

JPEG, GIF, MPEG

5. SESSION LAYER

5) Session Layer:

The Session Layer establishes, manages, and terminates sessions


(different from connections) between applications as they interact
on different hosts on a network
3 difference communication data transfer:
Single-duplex
Half-duplex
Full-duplex

Examples:
SQL, RPC, ASP, WINSOCK
4. TRANSPORT LAYER
4) Transport Layer:

The basic roles of the Transport Layer are to establish end-to-end


connections from one computer to another on the network and
provide reliable "transport" of data between devices.

Basic Transport Layer Services:

Resource Utilization (multiplexing)


Connection Management (establishing)
Flow Control (Buffering / Windowing)
Reliable Transport (positive acknowledgment / error checking

Examples:
TCP, UDP

3. NETWORK LAYER
3) Network Layer:
This layer works closely with layer 2 to translate data packets from
a logical address (similar to an IP address) into hardware based
MAC addresses

This layer is concerned with 2 functions:


Routing
Fragmentation / Reassembly

Two types of packets are used at the Network layer:


Data packets:
Example: IP, IPX, ICMP, Router
Route updates packets:
Example: RIP, EIGRP, OSPF
2. DATA LINK LAYER

2) Data Link Layer:

Physical Layer and Data Link Layer, work very closely together to
ensure data transfer across the physical network.

Examples:

Ethernet, ATM, Switches, Bridges, IEEE 802.3/802.2

1. PHYSICAL LAYER

1) Physical Layer:
It is responsible for defining the mechanical and electrical
specifications for the transmission medium within a connection, as
well as the transformation or encoding of data into “bits”

Examples:
Token Ring, Hubs, Repeaters, RJ-45, Ethernet
Class: 3 (Theory)

Types of Topology:
1. Star network topology
2. Bus network topology
3. Circle or ring network topology
4. Tree network topology
5. Mesh network topology
6. Interconnected ring network topology
7. Loop network topology
8. Y – type network topology

1) Star network topology:

2) Bus network topology:

3) Circle or Ring network topology:


NIC or LAN or Ethernet Card:

2 Addresses:
1) MAC Address
2) IP Address

1) Media Access Control Address:


Other names:
Hardware Address or Physical Address or Built in Address
Or Burnt in Address or Ethernet Address
12 digits Hex Decimal Format (0-9, A-F, 10-15)
6 digits Organically Unique Identify
6 digits Serial No or Vendor No or Nic No (Manufacturing no)
mm:mm:mm:mm/ss:ss:ss:ss
48 bits 2(4)

To View Mac Address:


cmd ipconfig /all

2) IP Address:

IP Address is used to identified the network and communication to


other computers (Logical Address or Network Address)

IANA Internet Assignment Number Authority whole Head

Internet Protocol Version 4:

4 bytes 32 bits 1 Byte 8 Bits

Decimal Dotted Notation

0.0.0.0 Reserved Address (N/w Address)

255.255.255.255 Reserved Address (Broad Cast Address)

1 to 254 Addresses (254)4 4 Billion Total IP Address


IP Classes:

Class Range Subnet Mask Max No of Clients

Class A 1 to 126 255.0.0.0 16777216

Class B 128 to 191 255.255.0.0 65536

Class C 192 to 223 255.255.255.0 256

Class D 224 to 239 Multicast

Class E 240 to 254 Research

Mostly Class C Address are Used in Networking

Sub netting:

Reason for Sub netting

To reduce the wastage of IP Address


Class: 4 (Practical)
Types of Cables:
The earliest LANs used coaxial cables. Over time, the twisted pair
cables used in telephone systems was improved to carry higher
frequencies and support LAN traffic

Local Area Networks use four types of cables:


1. Coaxial cable
2. Unshielded Twisted Pair (UTP)cable
3. Shielded Twisted Pair (STP) cable
4. Fiber Optic cable

Coaxial Cable:

Unshielded Twisted Pair (UTP) cable:


Shielded Twisted Pair (STP) cable:

Fiber Optic cable:


Types of Cabling:
1) Straight cabling
2) Cross cabling
3) Rollover cabling

Wire Coloring:
1 Orange
2 White Orange
3 Blue
4 White Blue
5 Brown
6 White Brown
7 Green
8 White Green
Straight cabling:
Host to Switch or Hub, Router to Switch or Hub
One Side 12345678
Another Side 12345678

Cross cabling:
Host to Host, Switch to Switch, Hub to Hub, Hub to Switch,
Router direct to Host
One side 12345678
Another side 36145278

Roll Over cabling:


Although rolled cable isn’t used to connect any Ethernet
Connections together, you can use a rolled Ethernet cable to
connect a host to a router console serial communication (Com) Port
LAN CARD DESIGN:
T Transfer
R Receiver
G Ground

Straight cabling: Different Device


System Switch
8 Pins: 8 wires 8 Pins: 8 wires
(T) 1 --------------------------------------------------- (T) 1
(T) 2 --------------------------------------------------- (T) 2
(R) 3 --------------------------------------------------- (R) 3
(G) 4 --------------------------------------------------- (G) 4
(G) 5 --------------------------------------------------- (G) 5
(R) 6 --------------------------------------------------- (R) 6
(G) 7 --------------------------------------------------- (G) 7
(G) 8 --------------------------------------------------- (G) 8

No One Side Connection Another Side Connection No


1 White Orange White Green 3
2 Orange Green 6
3 White Green White Orange 1
4 Blue Blue 4
5 White Blue White Blue 5
6 Green Orange 2
7 White Brown White Brown 7
8 Brown Brown 8
Class: 5 (Theory)

LAN & WAN infra structure devices

LAN Infrastructure:

There are numerous devices associated with data information flow


across a LAN. When adjoined, they create the infrastructure of a
functional LAN

LAN used Devices:

1. Repeaters
• Regenerate the signals

2. Bridges
• Bridge is used to reduce the broadcast domain

3. Hubs
• Hubs connect all computer LAN connections into one
device. They are nothing more than multiport repeaters.
Hubs cannot determine destinations; they merely
transmit to every line attached in a half-duplex mode

4. Switches
• Switches connect all computer LAN connections, the
same as hubs do. The difference is that switches can run
in full-duplex mode and are able to direct and filter
information to and from specific destinations
WAN Infrastructure:

As with WANs, there are numerous devices associated with data


information flow across a WAN

WAN used Devices:

1. Router
• Router are used to connect different network

2. ATM Switch
• ATM Switches provide high-speed transfer between
both LANs and WANs

3. Modem
• Modems convert digital and analog signals

4. Communication Server
• Communication Servers are typically dialed in/out
servers that allow users to dial in from remote locations
and attach to the LAN

5. Gateway
• IP to IPX
• IPX to IP
Class: 6(Practical)
System to System connection or Peer to Peer connection

Cabling should be Cross cabling

Both System works:

Step: 1

1) Both system O/S format should be NTFS

Solution:

My Computer Right Click O/S Drive Colon Right


Click Properties General File System NTFS

(New Technology Format or File System)

Step: 2

2) Check the LAN Card present or not for both systems

Solution:

See Your CPU Cabinet Back Side

Step: 3

3) Check the Driver CDS are updated or not for both systems

Solution:

My Computer Right Click Manage Device Manager


See Right Hand Side Network Adapter LAN Card Driver
name
Step: 4

4) Enable the LAN cards for both system

Solution:

My Network Place Right Click Properties Local Area


Connection Right Click Enable Click

Step: 5

5) Don’t Set the Firewall protection for both systems

Solution:

Start Run Control (Type) Ok Security Center


Open Virus Protection Recommendations Click Tick
that I have Antivirus program Ok See Left Hand Side
Resources Change the way Security Center Alert Me Click
Remove that All Check box tick then click Ok Close

Step: 6

6) Remove lock to LAN Card for both system

Solution:

Start Run Control (Type) Ok Windows Fire Wall


Open General Tick off Not Recommendation Ok

Step: 7

7) Tick to Show when icon is notification area when connected

Solution:

My Network Place Right Click Properties Local Area


Connection Right Click Properties General Tick
Show icon in Notification Area When Connected Remove
Tick From Notify Me When this connection has limited or
No connectivity
Step: 8

8) Set the IP Address for both systems

Solution:

My Network Place Right Click Properties Local Area


Connection Right Click Properties General Internet
Protocol (TCP /IP) Select Properties Click

Step: 9

9) Set the System name for both systems (Restart the systems)

Solution:

My Computer Right Click Properties Computer Name


Change click
Step: 10

10) After Finishing all the works

Step: 11

11) Connect the wire to two systems

Solution:

Connect the wires to all Systems LAN Card

Step: 12

12) Check you Ip Address is Correct or wrong in Dos


Command

Solution:

Start Run Cmd ipconfig /all

For More Information:

USAGE:
ipconfig [/? | /all | /renew [adapter] | /release [adapter] |
/flushdns | /displaydns | /registerdns |
/showclassid adapter |
/setclassid adapter [classid] ]

Examples:
> ipconfig ... Show information.
> ipconfig /all ... Show detailed information
> ipconfig /renew ... renew all adapters
> ipconfig /renew EL* ... renew any connection that has its
Name starting with EL
> ipconfig /release *Con* ... release all matching connections,
Eg. "Local Area Connection 1" or
"Local Area Connection 2"
Step: 13

13) Ping the both systems while connection are correct or


wrong

Solution:

Start Run Cmd ping < Target Ip Address > -t

Eg:

Source Ip Address is: 192.168.1.1

Designation Address is: 192.168.1.2

Start Run Cmd Ping 192.168.1.2 –t

For More Information:

C:\> Ping /?

Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] <target_name>

Step: 14

14) Share your Files or Folder or Drive Colon

Solution:

Create one Folder for Sharing then Right Click Sharing and
Security Click if you understand the risk but still want to
share the root of the drive, click here Click Network Sharing
and Security Tick Share this Folder on Network Type
Share name Tick Allow Network users to Change my Files
Apply Ok
Step: 15

15) Network Mapping

Solution:

a. First you share that particular Colon or Folder


b. Tools Map Network Drive Click

Drive Any Mapping Drive name

Folder \\<Shared System Name>\<Sharing Color or Folder>


Class: 7(Theory)
Define Switch
A switch is a small hardware device that joins multiple computers
together within one Local area network
Switch is a layer 2 device

Eg:
8 Port switch
Full duplex
1 broadcast domain
8 separate collision domain

Define Hub
A Hub is a new network device that is used for connecting
computers on a local area network
Hub is a layer 1 device

Eg:
8 Port Hubs
Half duplex
1 Broad cast domain
1 collision domain
Class: 8 (Practical)
Connection between more than two systems by using switch:

Cabling should be straight cabling

All Systems works:

1) Both system O/S format should be NTFS


2) Check the LAN Card present or not for both systems
3) Check the Driver CDS are updated or not for both systems
4) Enable the LAN cards for both system
5) Don’t Set the Firewall protection for both systems
6) Remove lock to LAN Card for both system
7) Tick to Show when icon is notification area when connected
8) Set the IP Address for both systems
9) Set the System name for both systems (Restart the systems)
10) After Finishing all the works
11) Connect the wire to two systems
12) Check your IP Address in Dos Command
13) Ping the both systems while connection are correct or
wrong
14) Share your Files or Folder or Drive Colon
15) Do you want to set Network Map
a. First you share that particular Colon or Folder
b. Then right click to Map Network Drive Click.

To check the connection for all systems:

Start Run CMD (type) ok Type ping <IpAddress> -t


Enter
Class: 9 (Theory)

Network Models:

1) Work Group Based Network


2) Domain Based Network

Define Server:

Server can control all clients

Server O/S Features:

1) File Server
2) Print Server
3) Application Server (IIS, ASP.NET)
4) Mail Server (POP3, SMTP)
5) Terminal Server
6) Remote Access/ VPN Server
7) Active Directory Server
8) Domain Name Server
9) Dynamic Host Configuration Protocol Server
10) WINS Server

Eg Server O/S:

1) Windows NT (Novel Edition),Windows 2000 Server,


Windows 2003 Server, Windows 2008 Server

Define Client:

Client get request to server

Eg Client O/S:

1) Windows 95, 98, 2000 Professional, XP, Vista,


2) Windows 7
1) Work Group Based Network:

No Server is present in the Network


Each machine acts as client as well as server
Individual Log on
Second category O/S
No License
Difficult to Backup data
Less Security
Can go by giving any id and Password
Low Expensive

Diagram of Work Group Based Network:

Or
2) Domain Based Network:

High Configuration
Administrator can give restriction to all systems, which
connected to server
In that Server system Server O/s Installed
Processor in server or server capability depends on clients
Centralized Logon
Third Category O/S
Must License in each client
Easy to backup data
High Security
Can go by using proper id, password
High Expensive (Server can choosing the Network)
Depends on cost and security

Diagram of Domain Based Network:

Or
Class: 10 (Practical)

Server with Client Access by using Switch Domain Based:

Server System Works:

1) Install Server O/S to Server System


2) O/S Format should be NTFS File System
3) Check the LAN Card present or not
4) Check the Driver CDS are updated or not
5) Enable the LAN Card
6) Don’t Set the Firewall protection
7) Remove the Lock to LAN Card
8) Tick Show icon in notification area when connected
9) Set the IP Address for Server systems
10) Set the System name for Server systems (Restart the
systems)
11) After finishing all the works
12) Check your IP Address in Dos Command
13) Connect all wires Server with Client System
14) Configure domain name for Server System (DNS)
15) Search all client to domain control
16) Add the ADS control for server
Server with Client Access Domain Based:

All Client Systems works:

1) Install Desktop O/S to client Systems


2) All systems O/S format should be NTFS file system
3) Check the LAN Card present or not
4) Check the Driver CDS are updated or not
5) Enable the LAN Card
6) Don’t Set the Firewall protection
7) Remove Lock to LAN Card
8) Tick when connection is enabled for LAN
9) Set the IP Address for client systems
10) Set the System name for client systems (Restart the
systems)
11) After finishing all the works
12) Check the IP Address in Dos Command
13) Give the Server Domain name for all Client Systems
ADDITION CONCEPT FOR NETWORKING

1. User Account Creation in Local or Client Computers


User Creation in Work Group

My Computer Properties Computer Name (Work Group


Domain)
Work Group Low Level Security
Domain High Level Security
User valid for 42 days only

Client System Work:

Steps for Configuration:


Start All programs Administrative Tools Computer
Management Local User & Groups Open User Right
Click New User
User Name : Karthik
Full Name : Karthikeyan
Description : Administrator
Password : India123
Confirm Pw : India123

Check Box:
User must change password at next logon
User cannot change Password
Password Never Expires
Account is disabled
Create Close

Steps for Working:


Start Logoff Click
User name : Karthik
Password : India123
Ok
2. User Account Creation in Domain or Server Computers

In Domain password must be complexity:


Length Min : 7 Characters Max : 65536
Characters

Complexity:
It has characters, special symbol and numbers combination

Steps for Server System:


Start All programs Administrative tools Active directory
users and computer select user Right click New user
First Name: karthi Initial: A
Last Name: keyan
Full Name: karthi a keyan
User logon Name
karthik@yahoo.com
Next Password : Welcome123
Confirm : Welcome123 Next Finish

Start run cmd gpupdate Enter

Steps for Client Systems:


Start Logoff click
User name : karthik
Password : Welcome123
Logon to : Hcl Ok
3. Remote Desktop connection
It is used to transfer the desktop screen of one machine to
another machine. It can be either server to client or client to
server. We can work two desktops at the same time in single
system. We can use server desktop for 3 system at a time but
client only one can take at a time remote access

Remote Desktop Connection Configuration:


First create one User Name with Password
Then My Computer Right Click Properties Remote
Tick Allow user to remotely to this Computer Select
Remote users Add Click Remote User Name Ok
Ok

Remote Desktop Connection Viewing Steps:


Start All programs Accessories communications
Remote Desktop connection computer: <System name or
System Ip> Connect

Or

Start Run mstsc Ok Computer: <System name or


System Ip> Connect

Remote Desktop Connection for Current Working screen:


Steps:
Start Run mstsc /console Ok Computer: <System
name or System Ip> Connect
4. Net Meeting
It is used to share the desktop screen of server or used to view the
servers work to in all the clients and also used to chatting

Server and Client Systems Works:

Steps for Configuration Net meeting:


Start Run Conf ok next next next ok (Finish)

Steps for Working Net meeting:


Start Run Conf Ok
Type you designation Ip Address or Host name click Call

Note:
From that call time both are in net meeting
5. User Account Local Security Policy Editing for Password
Used to Set the Password Security and Account Policy Security
Setting

Client System Work:

Steps for Configuration:


Start Control Panel Local Security Policy Security Setting
Account Policy Password Policy Click

Local Policy Settings:


Minimum Password Age 0 Days
Maximum Password Age 42 Days
Minimum Password Length 0 Characters
Password must meet complexity requirements Disable

Select Your Option then Right Click Change your Setting


value ok Close
6. Telnet Protocol

Telnet uses the Telnet protocol (part of the TCP/IP protocol suite)
to connect to a remote computer over a network. Telnet Client
software allows a computer to connect to a remote Telnet server
and run applications on that server

Telnet Configuration:
First create one User Name with Password
Start Control panel Administrative Tools Services
Open Telnet Right Click Properties Startup Type
Select Automatic Apply Ok
Telnet Right click Start click Close

Start Control Panel Window Firewall Advanced Local


Area Connection Settings Services Tick Telnet server
Ok Ok

Telnet Viewing Steps:


Start Run Cmd Telnet <System name or System Ip>
Enter

Welcome to Telnet
Enter the user Name : < User Name>
Enter the Password : <Password>
7. Remote Assistance
It is similar to net meeting we can view the server computers work
in client system as well as clients work in server.

Client system Work:

Start All programs Remote Assistance invite some one to


help you Save invitation as a file (advanced) Set timing
continue (Don’t use password) Save invitation Create a folder
in desktop Select folder properties Sharing Share this
folder Apply ok Save Close

Server System Work:

Start Run \\192.168.1.2 Ok


My Network place will be open Open shared folder open
folder
Do you want to continue admin pc now yes?

Server System Work:

Do you want to continue yes Do you work we can view that


in client ok
8. Group Policy Editing

There are 1200 group policies


It is used to hide the icons in the desktop operating system the
while icons in system

Steps for Configuration:


Start Run gpedit.msc Administrator templates
Start menu and templates Remove search menu from start menu
(Select any one) open Select enable ok

Refresh:
Start Run cmd gpupdate /force Enter Exit

To view that menu again selects option


Enable
Disable
Not configure
Ok Refresh
There are two concepts:
1) Computer Configuration
2) User Configuration

1) Computer Configuration
Computer Configuration settings can affect the total computer

2) Computer Configuration
User Configuration can affect only that particular user
9. Backup and Restore
Backup Tools
1) Nt Backup utility
2) Veritas
3) Backup files are stored as media files
Steps for Configure Backup:

Start Run ntbackup ok next Select one option


backup files and settings next let me choose next Select
folder next browser give file name (File name. bkf)
Save next finish close
Shift +Delete Delete that file then restore it

Steps for Configure Restore:

Open media files next restore next select folder next


finish close
10. Network Mapping

We can map our drive to all Computers

Steps for Configuration Server System:

First Share any Colon or Folder

Steps for Configuration all Client Systems:

My Computer Right Click Open Tools Menu Map


Network Drive Click

Click Finish
Networking concepts Questions:

1. What are the two types of transmission technology available?


(i) Broadcast and (ii) point-to-point

2. What is subnet?
A generic term for section of a large networks usually
separated by a bridge or router.

3. What are the possible ways of data exchange?


(i) Simplex (ii) Half-duplex (iii) Full-duplex

4. What is terminal emulation, in which layer it comes?


Telnet is also called as terminal emulation. It belongs to
application layer

5. What is RAID?
A method for providing fault tolerance by using multiple hard
disk drives

6. What is router?
Hybrid devices that combine the features of both bridges and
routers

7. What is MAC address?


The address for a device as it is identified at the Media
Access Control (MAC) layer in the network architecture. MAC
address is usually stored in ROM on the network adapter card and
is unique

8. What is ICMP?
ICMP is Internet Control Message Protocol, a network layer
protocol of the TCP/IP suite used by hosts and gateways to send
notification of datagram problems back to the sender. It uses the
echo test / reply to test whether a destination is reachable and
responding. It also handles both control and error messages
9. What is the range of addresses in the classes of internet
addresses?
Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 247.255.255.255

10. What are major types of networks and explain?


Server-based network
Peer-to-peer network

11. What is mesh network?


A network in which there are multiple networks links
between computers to provide multiple paths for data to travel

12. Why should you care about the OSI Reference Model?
It provides a framework for discussing network operations
and design

13. What is Mail Gateway?


It is a system that performs a protocol translation between
different electronic mail delivery protocols

14. What is OSPF?


It is an Internet routing protocol that scales well, can route
traffic along multiple paths, and uses knowledge of an Internet's
topology to make accurate routing decisions

15. What is RIP (Routing Information Protocol)?


It is a simple protocol used to exchange information between
the routers

Você também pode gostar