Networking
Networking
Networking
Study Material
Page 433
Computer Networking
Agenda:-
Page 434
7.What is Casting?
Unicast
Multicast
Broadcast
Network Cables
RJ45 Connector
Network Cards
HUB
Switch
Routers
Modem
Gateway
Bridge
Repeater
Firewall
IP Version-6
Page 435
11. OSI Model
7. The Application Layer
Practical:-
14.How
How to Share Data from one Computer to another Computer.
1. How to Assign IP Address(Set IP Address)
2. How to Check IP Address(Get IP Address)
3. How to Assign Host Name(Set Hostname)
4. How to Check Host Name(Get Hostname)
5. How to Ping Computer by IP address or Hostname
6.. How to Share Data from one Computer to other Computer.
7.. How to Access the Shared Data
8. Remote Desktop Connection for LAN (MSTSC)
9. Remote Access for WAN ((Anydesk)
Page 436
1. What is Computer Network:
Network:-
A Computer network is a system in which multiple computers are connected to each
other to share information and resources.
A Computer Network is a collection of computers, network devices connected to each
another allow the Computer to communicate with each other and sharing of data and
resources.
Ex:- Printer, Modem and HDD etc.
ARPANET:-Advanced
Advanced Research Project Agency Network.
Page 437
Note:-
1.File Sharing:-Networking
Networking of computers helps the network users to share data files.
2.Hardware Sharing:- Users can share devices such as printers, Scanners, CD-ROM
CD
drives, Hard disk drives and Modem etc…
3.Application Sharing:- Applications can be shared over the network and this allows to
implement client/server application.
4.User Communication:- Networks allow users to communicate using e-mail,
e newsgroups,
and Video conferencing etc..
5.Software Sharing:- Users can share software such as OS, MS
MS-Office
Office etc.
3. Network Configuration
There are two types of Network Configuration
1. Peer to Peer Model
2. Client and Server Model
Page 438
2.Client-Server Model
Client-Server is a communication Model in which there is a dedicated server
and specific clients in the client-server.
In the client-server model, the server provides services to the client and client
receive
eceive services by server.
In the client-server model, data is stored on a centralized server.
server
The Server is a More Powerful System which manages clients.
Page 439
Difference between Client
Client-Server and Peer to Peer Network Model
BASIS FOR
PEER
PEER-TO-PEER CLIENT-SERVER
COMAPARISION
1.Basic Each
ach node act as There is a specific server and
the server.
3.Expense Peer-to-peer
peer are less The client-server are
implement.
Page 440
4.Types of Computer Network
The Network allows computers to connect and communicate with different computers via
any medium. LAN, MAN and WAN are the three major types of the network designed to
operate over the area they cover.
1.LAN:-
Page 441
2.MAN:-
This is stand for Metropolitan area Network .
MAN covers a larger area than that of a LAN and smaller area as compared to WAN.
MAN is designed for customers who need a high
high-speed connectivity.
More than one LAN is called MAN.
The Coverage area of MAN is City.
Ex- TV. Cable.
Note:- The Range of MAN Network is Single City.
Page 442
3.WAN
This is Stand for Wide Area Network.
WAN is a computer network that extends over a large geographical area.
The Coverage area of WAN is State, Country, and Cross Country.
Collection of LAN and MAN is called WAN
Ex-
Internet.
Note:- There is no Limit of WAN.
Page 443
4.CAN
This is Stand for Campus Area Network
A CAN is a network of multiple interconnected local area networks (LAN) in a limited
geographical area.
A CAN is smaller than MAN or WAN.
A CAN is also known as a corporate area network or Controller Area Network.
Network
Ex:-
Page 444
5.PAN
This is Stand Personal Area Network
PAN is the interconnection of information technology devices within the range of an individual person.
Range of 10 meters
Ex:-
Bluetooth or infrared connections
6.SAN
This is Stand for Storage Area Network.
SAN is a computer network which provides access to consolidated, block
block-level
level data storage.
SAN are primarily used to enhance accessibility of storage devices, such as hard disk.
Page 445
7.EPN
8.VPN
Page 446
9.BAN
This is Stand for Body Area Network
A body area network (BAN), also referred to as a wireless body area network (WBAN)
A BAN is the interconnection of multiple computing devices , implanted in a person’s body.
A BAN typically includes a Smartphone in a pocket or bag that serves as a mobile data hub.
10.RAN
This is Stand for Radio Access Network
A RAN is part of a mobile telecommunication system. It implements a radio access
technology. Conceptually, it resides between a device such as a mobile phone, computer.
computer
Page 447
5.What is Wireless Network
Wireless network is a network set up by using radio signal frequency to communicate among computers and
other network devices. Sometimes it’s also referred to as Wi-Fi network or WLAN .
This network is getting popular nowadays due to easy to setup feature and no cabling involved.
Page 448
6.What is Transmission Mode
The Transmission Mode is the flow of data from one Computer to Other Computer.
1.Simplex Mode:-
In this type of Transmission Mode, data can be sent only in one direction.
direction
OR
In this Transmission Mode,, Communication is done only one direction.
Ex:- TV Serial,
rial, Radio, Keyboard and Mouse etc..
SenderReceiver
Page 449
2.Half Duplex Mode:-
In this type of Transmission Mode data can be Sent / Transmitted in both directions but not at the
same time.
OR
In this Transmission Mode,, Communication is done Both direction but not at the same time.
SenderReceiver
SenderReceiver
OR
In this Transmission Mode,, Communication is done simult
simultaneously
aneously in the Both direction
at the same time.
Ex-Mobile
SendReceive
Page 450
What is Casting
Data is transported over a network by three simple Casting methods.
1.Unicast:-
From One Source to One Destination.
i.e. One-to-One
2.Multicast:-
From One Source to Multiple Destinations.
i.e. One-to-Many
3.Broadcast:-
From One Source to All Possible Destinations.
i.e. One-to-All
Page 451
Diagram:-
Page 452
7. What is Network Components
Network Components are the major parts which are needed to Setup Computer Network
that we can share resources.
Some important network components are NIC, Cable, Switch, Hub, Router, and Modem.
Network
ork Components required for set
setup a Computer Network.
Network Cables
RJ45 Connector
Network Cards
HUB
Switch
Routers
Modem
Gateway
Bridge
Repeater
Firewall
Page 453
What is Network Cables:--
Networking cables are networking hardware used to connect one network device to
other network devices or to connect two or more computers to share data and Printer.
1.Coaxial Cables
1.Coaxial Cables:-
Page 454
2.Twisted Pair Cable (TP)
A Twisted Pair cable is a type of cable made by putting two separate insulated wires together in
a twisted pattern.
UTP is a cable with wires that are twisted together to reduce noise and crosstalk.
UTP cables are generally used in short lengths such as inside a building, or within a server room.
Page 455
What is RJ45 Connector
RJ45 Stand for Registered Jack
RJ45 is a standardized physical network interface for connecting telecommunications.
RJ45 is a type of connector commonly used for Ethernet networking Cable
jack(RJ11).
It looks similar to a telephone jack
Page 456
ii)External Network Card
External network cards are of two types: Wireless and USB based. Wireless network card needs to be
inserted into the motherboard, however no network cable is required to connect to the network.
What is HUB
Hub is the most basic networking device that connects multiple computers or other network devices
together.
Hub is a Repeater with multiple ports simply receives the data from one port and sends the data to all the
ports.
Imp Points
*Layer-1 Device
*LAN Device
*Half Duplex Mode
*Always Broadcast
*No Secure
*fast
*Signal Collision Domain
*Cannot Store MAC
*Passive and Active HUB
*4/8/12 Port.
Page 457
What is Switch
Switch is a Networking device that connects multiple computers or other network devices together.
Switch Provide the high-speed
speed that receives incoming data packets and redirects them to their destination on a
local area network(LAN)
On a network, a switch filters and forwards network packets.
Imp Points
*Layer-2 Device
*Full duplex
*First Broadcast then Unicast and Multicast.
*Every port of switch is separate collision domain
*switch has one broadcast domain
*Secure
*Slow
*Maintain CAM(Content Accessible Table)
*5/6/8/16/24/32/48 Port
Types of switch
Wires Switch(10/100/1000 Mbps)
Page 458
Difference between HUB and SWITCH
Hub Switch
1.Layer Hub works in Physical Switch works in Data Link Layer (2nd Layer)
Layer.(1st Layer)
3.Device Type Passive Device (Without Active Device (With Software) & Networking device
Software)
4.Speed 10 / 100 / 1000 Mbps 10 Mbps /100 Mbps / 1000 Mbps / 10 Gbps
7. Transmission Broadcast
roadcast transmission Unicast, Multicast as well as Broadcast transmission Mode
Type Mode
Page 459
What is Routers
Router is an intelligent Network Device(Layer
Device(Layer-3 device).
Router connect two or more network segments which may be near or very far and having
different of Cabling.
Router can work in LAN and WAN environment.
Router is used to Convert LAN to WAN.
It is also called Modem
Imp Points
Connect LAN to WAN
Find Best Rout
Work as Modem
Work as Gateway
Work as Bridge
Access Point
Types of Router:-
Page 460
What is Modem:-
This is stand for Modulator and Demodulator
Modulator:- Modulator means convert digital signal into Analog Signal
Demodulator:- Demodulator means convert Analog Signal into Digital Signal
Modem help us to transmit Data from one Comp
Computer to another Computer using Telephone Line.
L
Modem Basically used for Access the Internet.
A Modem is a Network device that both Modulates and Demodulates analog Carrier signals for encoding and
decoding digital information for processing.
The most common use for modems is for both sending and receiving of the digital information between
personal computers. This information used to be transmitted over telephone lines
lines.
Types of Modem:-
There are 3 types of Modem
1.Internal Modem:-
An Internal Modem is a Circuit Board that can attached inside the System through Expension Slots.
2. External Modem:-
An External Modem is attached to the Computer System with the help Serial Port(Com-1
Port(Com or Com-2).
3.Wifi Modem:-
A Wireless Modem transmit data through Air(Unique Media) instead of Cable(Guide Media)
It is also called Radio Frequency Modem.
Page 461
What is Gateway
Gateway is a Networking device acts as an entrance(Gate) for another network.
It is used to routes the traffic from an internal network to the outside network and work
as a "Gate" between two networks.
It often acts as Firewall or Router.
Page 462
What is Bridge:-
A Bridge is
s a type of computer network device that provides interconnection with other bridge networks that use the
same protocol. Bridge devices work at the data link layer of the OSI model, connecting two different networks together
and providing communication between them.
*layer-2 device
*Bridge reduce the amount of traffic on a LAN by dividing it into two segments.
*The major different between the Bridge and repeater is that Bridge has a filtering capability.
Page 463
What is Firewall
In computing, a firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. A firewall typically establishes a
barrier between a trusted internal network and untrusted extern
external
al network, such as the Internet.
A firewall is a virtual 'wall' between your computer and the outside world.
Hardware firewalls:-
Hardware firewalls are found on most network routers and can be configured through the router
setup screen.
What is Repeater
A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or topological network boundary than what would be capable with the original signal.
It regenerates your signals.
Page 464
8.What is Topology:-
Topology is the Pattern / Design of Network device which describe the way to Connected Device in the Network.
Types of Topology
Star Topology
Bus Topology
Ring Topology
Tree Topology
Mesh Topology
Hybrid Topology
1.Star Topology:-
Star Topology is one of the most common network setups.
In this configuration, every node connects to a central network device, like a hub, switch.
The central network device acts as a server and the peripheral devices act as clients.
If one computer on the network fails, the rest of the network continues to function normally.
Page 465
2.Bus Topology:-
Bus Topology is a network setup where each computer and network device is connected to a single cable
or backbone. Network card, RJ-45 Network cable is used to connect them together.
Page 466
3.Ring Topology:-
A Ring Topology is a network configuration in which device connections create a
circular data path.
Ring Topologies may be used in either LANs or WANs.
the ring topology was most commonly used in schools, offices, a
and
nd smaller buildings where
networks were smaller.
Page 467
4.Tree Topology:-
A Tree Topology is a special type of structure in which many connected elements are arranged like the branches of
a tree.
Tree Topology is used in corporate Network.
Tree Topology is also known as a Star Bus Topology because it combination of Star and Bus Topology.
5.Mesh Topology:-
Mesh Topology commonly used for wireless networks.
Manages high amounts of traffic, because multiple devices can transmit data simultaneously.
Page 468
6.Hybrid Topology:-
A Hybrid Topology is a type of network topology that uses two or more differing network Topologies.
These topologies include a mix Of Star Topology Bus Topology, Ring Topology, Mesh Topology, Tree Topology.
Page 469
9.IP Address
Agenda:-
i) What is IP Address
ii) Types of IP Address
iii) What is Subnet Mask.
iv)How to set the IP Address
v)How to get the IP Address
i) What is IP Address
IP Address is an Unique address mostly used by computers to communicate over a network.
A device
vice on the Network needs an IP Address to Communicate with the other devices.
IP address is a unique 32-bit
bit logical address assigned to each device which is connected to a network.
An IP address is used to communicate with various networking devices and operates at network layer.
IP address is similar to Telephone number which is unique.
1. IPv4 Address
2. IPv6 Address
IP-v4 Address:-
IPv4 addresses are 32 bits long (4 bytes).
IP-v6 Address:-
A major advantage of IPv6 is that it uses 128 bits (16 bytes) of data to store an unique
addresses 340,282,366,920,938,463,463,374,607,431,768,211,456.
The size of IPv6's address is much, much larger than IPv4.
Page 470
IPv4 address classes
With an IPv4 address is divided into 5 classes,
Class A
Class B
Class C
Class D
Class E
Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or research and development purposes.
Page 471
Note:-
Ranges 127.0.0.1 are reserved for the loopback address or localhost address.
And
Class A IP Address:-
Class B IP Address:-
Class C IP Address:-
Class D IP Address:-
Class D address is designed for multicasting. Each address in this class defined a particular group of hosts
over the internet.
Class E IP Address:-
Page 472
iii) What is Subnet Mask:
Mask:-
A Subnet mask specifies which part of an IP address is reserved for the network use and which part is available for host use.
1.Network Portion:-Define
Define the Network Address
Page 473
10.OSI Model
This is stand for Open System Interconnection.
7.Application Layer
6.Presentation Layer
5.Session Layer
4.Transport Layer
3.Network Layer
2.Data Link Layer
1.Physical Layer.
Protocol defines the procedure that is to be followed during data Transmission from
one device to other device.
Page 474
1.Application Layer
Application Layer is the Seven Layer of the OSI Model.
Application Provides the means for the User an access information on the Network using an application.
Protocols of Application Layer are: HTTP, HTTPS, FTP, Telnet, DNS, SMTP, POP3, IMAP.
2.Presentation Layer
Presentation Layer is the Sixth Layer of the OSI Model.
Presentation layer deals with Syntax and Semantics of the data exchanged between two devices.
Presentation Layer responsible for delivering the forms of Text, Graphics, Audio, Video information that is to be sent
to the user.
Presentation Layer Translate, Compress the Data, Encoding Scheme and Encryption.
3.Session Layer
Session Layer is the Fifth Layer of the OSI Model
Session Layer responsible for Validating establish, Manage, Synchronize and terminate Connation between the
Computers/User.
Page 475
4.Transport Layer
Transport Layer is the Forth Layer of the OSI Model.
Transport layer is responsible for source to destination delivery of the entire Message.
Transport Layer is responsible for control of Data flow and, if an error occurs, reconnect and re-transmit
re .
5.Network Layer
Network layer is the Third Layer of the OSI Model.
Router
NIC (Network Interface Card)
Function: Sorting, Filtering and distribution.
Data link Layer Handle, data transfer between Network and the Physical Layer.
Switch
Bridge
MAC address Protocols of Data link are: Frame Relay, ATM,HDLC, SLIP etc.
Page 476
7.Physical Layer
Physical Layer is the First Layer of the OSI Model.
Physical Layer receive data from the Upper Layer called Data Link Layer.
HUB
Repeater
Cable
Connector…etc
Page 477
Diagram:-
Page 478
11.Computer Virus
Agenda:-
1.What is Computer Virus?
2.Types of Computer Virus
3.Signs of Virus Infection
वायरस, वषाण)ु
What is Computer Virus?(वायरस
This is stand for Vital Information Resources Under Seize
Computer Virus is a piece of code which is capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data.
A computer virus is a malicious program that self
self-replicates
replicates by copying itself to another program.
Virus is also Called Malware / Badware
Viruses spread is through:
EE-mails
visiting an infected website
clicking on an executable file,
viewing an infecte
infected advertisement
USB Pen drives and Hard disk.
2.Types of Malware:-(Malicious
(Malicious + Software )
1. Virus
2. Worm
3.Trojan Horse
4.Adware
5.Spyware
6.Ransomware
7.Scareware
8.Backdoor
9.Rootkits
Page 479
3.Signs of Virus Infection
Pop-ups
ups bombarding the screen
Window Firewall ON
Install Antivirus.
Meanings:-
1.Malicious:-Bura Chahane Wala
2.Replicates:-Dohrana
3.Spread:- Failana
4.infect:-Ganda krna
5.Vulnerable:-Chapet me / kamjor
6.intent:- irada
7.prey:-Shikaar Krna
9.vital:- Mahatwapurn
Page 480
12.What is Antivirus(AV Software)
Antivirus software also known as anti
anti-malware is a computer program used to prevent, detect, and remove
Virus.
Antivirus software was originally developed to dete
detect
ct and remove computer viruses.
2. Guardian Antivirus
3. Avast Antivirus
4. AVG Antivirus
5. Avira Antivirus
6. Kaspersky Antivirus
7. McAfee Antivirus
Page 481
13.Practical
Agenda:-
1. How to Assign IP Address(Set IP Address)
2. How to Check IP Address(Get IP Address)
3. How to Get and Set Host Name.
4. How to Ping Computer
5. How to Share Data from one Computer to other Computer.
6. How to Access the Shared Data
7.. Remote Desktop Connection for LAN (MSTSC)
8. Remote Access for WAN (Any Desk))
Win+RcmdOK
C:\>ipconfig
Output:-
IP Address:- 192.168.1.1
Subnet Mask:- 255.255.255.0
Win+RcmdOK
C:\>hostname
Output:- Sonisoft001
Page 482
4. How to Ping Computer
*Connect two Computer by LAN Cable.
*Assign Same range IP Address of Both Computer
*Ping Both Computer:-
Win+Rcmd
cmdokPing 192.168.1.1 (Ping own PC)
Win+Rcmd
cmdokPing 192.168.1.2 (Ping other PC)
Note:- if Both PC are Ping Properly then PC have Successfully in the Network.
Password:-Soni@123
Soni@123OK
*AAMMYY Admin
*TeamViewer
Page 483