0% found this document useful (0 votes)
148 views51 pages

Networking

The document provides an overview of computer networking concepts. It defines a computer network as a system that connects multiple computers to share information and resources. It discusses network configurations including peer-to-peer and client-server models. It also describes different types of networks like LAN, MAN, WAN and others according to the geographical area they cover. Additionally, it outlines components required for networking computers and various networking concepts such as topologies, IP addressing, OSI model, and security threats.

Uploaded by

s73766k
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
148 views51 pages

Networking

The document provides an overview of computer networking concepts. It defines a computer network as a system that connects multiple computers to share information and resources. It discusses network configurations including peer-to-peer and client-server models. It also describes different types of networks like LAN, MAN, WAN and others according to the geographical area they cover. Additionally, it outlines components required for networking computers and various networking concepts such as topologies, IP addressing, OSI model, and security threats.

Uploaded by

s73766k
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 51

Chapter-8

Networking

Study Material

Page 433
Computer Networking
Agenda:-

1. What is Computer Network?

2. Characteristics of a Computer Network

3. Types of Computer Network Configuration


 Peer to Peer Model
 Client and Server Model

4. Types of Computer Network


 LAN (Local Area Network)
 MAN (Metropolitan Area Network)
 WAN (Wide Area Network)
 PAN (Personal Area Network)
 CAN (Campus Area Network)
 SAN (Storage Area Network)
 EPN (Enterprise Private Network)
 VPN (Virtual Private Network)
 BAN (Body Area Network)
 RAN (Radio Access Network)

5. What is Wireless Network and its Types?


 WLAN
 WMAN
 Wi-Fi

6. What is Transmission Mode


 Simplex
 Half Duplex
 Full Duplex

Page 434
7.What is Casting?
 Unicast
 Multicast
 Broadcast

8.. Network Components required for set up a Computer Network.

 Network Cables
 RJ45 Connector
 Network Cards
 HUB
 Switch
 Routers
 Modem
 Gateway
 Bridge
 Repeater
 Firewall

9.What is Topology and it’s Types


Types?
 Star Topology
 Bus Topology
 Ring Topology
 Tree Topology
 Mesh Topology
 Hybrid Topology

10. What is IP Address and it’s Types?


 IP Version-4

 IP Version-6

Page 435
11. OSI Model
 7. The Application Layer

 6. The Presentation Layer

 5. The Session Layer.

 4. The Transport Layer

 3. The Network Layer

 2. The Data Link Layer

 1. The Physical Layer

12.. What is Computer Virus and it’s Types?

13. What is Antivirus?

Practical:-
14.How
How to Share Data from one Computer to another Computer.
1. How to Assign IP Address(Set IP Address)
2. How to Check IP Address(Get IP Address)
3. How to Assign Host Name(Set Hostname)
4. How to Check Host Name(Get Hostname)
5. How to Ping Computer by IP address or Hostname
6.. How to Share Data from one Computer to other Computer.
7.. How to Access the Shared Data
8. Remote Desktop Connection for LAN (MSTSC)
9. Remote Access for WAN ((Anydesk)

Page 436
1. What is Computer Network:
Network:-
A Computer network is a system in which multiple computers are connected to each
other to share information and resources.
A Computer Network is a collection of computers, network devices connected to each
another allow the Computer to communicate with each other and sharing of data and
resources.
Ex:- Printer, Modem and HDD etc.

An excellent example of a Network is the Internet,


Internet
which connects millions of people all over the world.

What was the first Computer Network?


The first computer networks is called ARPANET was developed in 1960.
The first ARPANET Message was sent on October 29, 1969.

ARPANET:-Advanced
Advanced Research Project Agency Network.

2. Need for Computer Network


 Sharing files, folders, data and information.
 Sharing
ing Hardware resources such as Printer, Modem, Hard disk… etc.
 Sharing Software, as many users connected to the Network can run the same
Application Program.

Page 437
Note:-
1.File Sharing:-Networking
Networking of computers helps the network users to share data files.
2.Hardware Sharing:- Users can share devices such as printers, Scanners, CD-ROM
CD
drives, Hard disk drives and Modem etc…
3.Application Sharing:- Applications can be shared over the network and this allows to
implement client/server application.
4.User Communication:- Networks allow users to communicate using e-mail,
e newsgroups,
and Video conferencing etc..
5.Software Sharing:- Users can share software such as OS, MS
MS-Office
Office etc.

3. Network Configuration
There are two types of Network Configuration
1. Peer to Peer Model
2. Client and Server Model

1.Peer to Peer Model:-


 Peer to Peer is a communication Model in which each party has the same Capabilities.
 Peer-to-Peer each node can act as both server and client.
 Peer-to-peer each node has its own data.

Page 438
2.Client-Server Model
 Client-Server is a communication Model in which there is a dedicated server
and specific clients in the client-server.
 In the client-server model, the server provides services to the client and client
receive
eceive services by server.
 In the client-server model, data is stored on a centralized server.
server
 The Server is a More Powerful System which manages clients.

Page 439
Difference between Client
Client-Server and Peer to Peer Network Model

BASIS FOR
PEER
PEER-TO-PEER CLIENT-SERVER
COMAPARISION

1.Basic Each
ach node act as There is a specific server and

client and server. specific clients connected to

the server.

2.Data Each node has its The data is stored in a

own data.(No Security) centralized server.(Security)


Security

3.Expense Peer-to-peer
peer are less The client-server are

expensive to expensive to implement.

implement.

4.Security Less Secure More Secure

Page 440
4.Types of Computer Network
The Network allows computers to connect and communicate with different computers via
any medium. LAN, MAN and WAN are the three major types of the network designed to
operate over the area they cover.

There are three types of Computer Network:


Network:-

1.LAN:-

 This is stand for Local Area Network.


 LAN is a group of computers and other devices that are connected together over a
network and are all in the same location.
 LAN connects network devices in such a way that personal computer and
workstations can share data, the group of computers and devices are connected
together by a switch.
 The Coverage Area/Range of LAN is 1 KM.

Ex- Building, Office, Home, Collage, Hospital, Railway Station etc…

Note:- The Range of LAN Network is 1 KM.

Page 441
2.MAN:-
 This is stand for Metropolitan area Network .
 MAN covers a larger area than that of a LAN and smaller area as compared to WAN.
 MAN is designed for customers who need a high
high-speed connectivity.
 More than one LAN is called MAN.
 The Coverage area of MAN is City.
Ex- TV. Cable.
Note:- The Range of MAN Network is Single City.

Page 442
3.WAN
This is Stand for Wide Area Network.
WAN is a computer network that extends over a large geographical area.
The Coverage area of WAN is State, Country, and Cross Country.
Collection of LAN and MAN is called WAN

Ex-
Internet.
Note:- There is no Limit of WAN.

Page 443
4.CAN
This is Stand for Campus Area Network
A CAN is a network of multiple interconnected local area networks (LAN) in a limited
geographical area.
A CAN is smaller than MAN or WAN.
A CAN is also known as a corporate area network or Controller Area Network.
Network

Ex:-

Railway Station, Hospital, University, and Shopping Mall etc..

Page 444
5.PAN
This is Stand Personal Area Network
PAN is the interconnection of information technology devices within the range of an individual person.
Range of 10 meters

Ex:-
Bluetooth or infrared connections

6.SAN
This is Stand for Storage Area Network.
SAN is a computer network which provides access to consolidated, block
block-level
level data storage.
SAN are primarily used to enhance accessibility of storage devices, such as hard disk.

Page 445
7.EPN

This is Stand for Enterprise Private Network


The Electronic Payments Network is a financial clearing house for the private sector that handles
various types of electronic funds transfers, either among accounts at the same bank or to different
accounts at separate financial institutions.

8.VPN

This is Stand for Virtual Private Network.


A virtual private network extends a private network across a public network, and enables users to send and
receive data across shared or public networks
networks.

Page 446
9.BAN
This is Stand for Body Area Network
A body area network (BAN), also referred to as a wireless body area network (WBAN)
A BAN is the interconnection of multiple computing devices , implanted in a person’s body.
A BAN typically includes a Smartphone in a pocket or bag that serves as a mobile data hub.

10.RAN
This is Stand for Radio Access Network
A RAN is part of a mobile telecommunication system. It implements a radio access
technology. Conceptually, it resides between a device such as a mobile phone, computer.
computer

Summery All Networks

Page 447
5.What is Wireless Network
Wireless network is a network set up by using radio signal frequency to communicate among computers and
other network devices. Sometimes it’s also referred to as Wi-Fi network or WLAN .
This network is getting popular nowadays due to easy to setup feature and no cabling involved.

Types of Wireless Network:


Network:-
 WLAN
 WMAN
 WiFi

Page 448
6.What is Transmission Mode
The Transmission Mode is the flow of data from one Computer to Other Computer.

Types of Transmission Mode

1.Simplex Mode:-
In this type of Transmission Mode, data can be sent only in one direction.
direction
OR
In this Transmission Mode,, Communication is done only one direction.

Ex:- TV Serial,
rial, Radio, Keyboard and Mouse etc..

SenderReceiver

Page 449
2.Half Duplex Mode:-
In this type of Transmission Mode data can be Sent / Transmitted in both directions but not at the
same time.
OR
In this Transmission Mode,, Communication is done Both direction but not at the same time.

Ex:- Walkie -Talkie

SenderReceiver
SenderReceiver

3.Full Duplex Mode:-


In this type of Transmission Mode data can be Sent / Transmitted in both directions at the
same time.

OR
In this Transmission Mode,, Communication is done simult
simultaneously
aneously in the Both direction
at the same time.

Ex-Mobile

SendReceive

Page 450
What is Casting
Data is transported over a network by three simple Casting methods.

1.Unicast:-
From One Source to One Destination.
i.e. One-to-One

2.Multicast:-
From One Source to Multiple Destinations.
i.e. One-to-Many

3.Broadcast:-
From One Source to All Possible Destinations.
i.e. One-to-All

Page 451
Diagram:-

Page 452
7. What is Network Components
Network Components are the major parts which are needed to Setup Computer Network
that we can share resources.
Some important network components are NIC, Cable, Switch, Hub, Router, and Modem.

Network
ork Components required for set
setup a Computer Network.

 Network Cables
 RJ45 Connector
 Network Cards
 HUB
 Switch
 Routers
 Modem
 Gateway
 Bridge
 Repeater
 Firewall

Page 453
What is Network Cables:--
Networking cables are networking hardware used to connect one network device to
other network devices or to connect two or more computers to share data and Printer.

If we want to establish the Network connection, then we use Cable.

Types of Cable / Wire:-

There are three types of Network Cable.

1.Coaxial Cables

2.Twisted Pair Cable (TP)

i.) Unshielded Twisted Pair (UTP


(UTP)
ii.) Shielded Twisted Pair (STP)

3.Fiber Optics Cable (FOC)

1.Coaxial Cables:-

Coaxial Cable used in a variety of communication and electronic networks, from


transmitting radio frequencies to connecting DVD playe
players
rs to an audio system.
Coaxial cable used to television and radio broadcasts.

Ex:- Dish cable, DVD Player, T


Television and Radio.

Page 454
2.Twisted Pair Cable (TP)
A Twisted Pair cable is a type of cable made by putting two separate insulated wires together in
a twisted pattern.

There are two Types of Twisted Pair Cable:-

i) Unshielded Twisted Pair (UTP)

UTP is a cable with wires that are twisted together to reduce noise and crosstalk.

UTP cables are generally used in short lengths such as inside a building, or within a server room.

ii) Shielded Twisted Pair (STP)


STP is a twisted pair cable confined in foil or mesh shield that guards the cable against
electromagnetic interference.
Every pair of wire is separately shielded with foil
foil.

3.Fiber Optics Cable (FOC)


An optical fiber cable, also known as a fiber optic cable, is an assembly similar to an electrical
cable, but containing one orr more optical fibers that are used to carry light.
Data Transfer in the form of Light.

Page 455
What is RJ45 Connector
RJ45 Stand for Registered Jack
RJ45 is a standardized physical network interface for connecting telecommunications.
RJ45 is a type of connector commonly used for Ethernet networking Cable
jack(RJ11).
It looks similar to a telephone jack

What is Network Cards


Network card is a necessary component of a computer without Network card
a computer cannot be connected over a network.
It is also called Ethernet, Network
etwork adapter, Network Interface Card (NIC).
Most branded computers have network card pre
pre-installed.

Types of Network Cards:


Cards:-
There are two types of Network Card
i) Internal Network Card
ii)External Network Card

i) Internal Network Card


Motherboard has a expansion slot for installing internal network card.

Page 456
ii)External Network Card
External network cards are of two types: Wireless and USB based. Wireless network card needs to be
inserted into the motherboard, however no network cable is required to connect to the network.

What is HUB
Hub is the most basic networking device that connects multiple computers or other network devices
together.
Hub is a Repeater with multiple ports simply receives the data from one port and sends the data to all the
ports.

Imp Points
*Layer-1 Device
*LAN Device
*Half Duplex Mode
*Always Broadcast
*No Secure
*fast
*Signal Collision Domain
*Cannot Store MAC
*Passive and Active HUB
*4/8/12 Port.

Page 457
What is Switch
Switch is a Networking device that connects multiple computers or other network devices together.
Switch Provide the high-speed
speed that receives incoming data packets and redirects them to their destination on a
local area network(LAN)
On a network, a switch filters and forwards network packets.

Imp Points
*Layer-2 Device
*Full duplex
*First Broadcast then Unicast and Multicast.
*Every port of switch is separate collision domain
*switch has one broadcast domain
*Secure
*Slow
*Maintain CAM(Content Accessible Table)
*5/6/8/16/24/32/48 Port

Types of switch
Wires Switch(10/100/1000 Mbps)

ii)Wireless Switch(100 Mbps /1000 Mbps / 10 Gbps)

Page 458
Difference between HUB and SWITCH

Hub Switch

1.Layer Hub works in Physical Switch works in Data Link Layer (2nd Layer)
Layer.(1st Layer)

2.Ports Switch can have 24 to 48 ports.


Hub can have maximum
8 to 12 ports.

3.Device Type Passive Device (Without Active Device (With Software) & Networking device
Software)

4.Speed 10 / 100 / 1000 Mbps 10 Mbps /100 Mbps / 1000 Mbps / 10 Gbps

5.Used in (LAN, LAN LAN


MAN, WAN)

6.Transmission Half duplex Half duplex / Full duplex


Mode

7. Transmission Broadcast
roadcast transmission Unicast, Multicast as well as Broadcast transmission Mode
Type Mode

8.Necessary for No. No


Internet
Connection?

9.Device Non intelligent device Intelligent Device


Category

10.Manufacturers Cisco, D-Link,


Link, Cisco, D-Link, Sun Systems, NETGEAR and IBM.
Sun Systems, NETGEAR
And IBM.

Page 459
What is Routers
 Router is an intelligent Network Device(Layer
Device(Layer-3 device).
 Router connect two or more network segments which may be near or very far and having
different of Cabling.
 Router can work in LAN and WAN environment.
 Router is used to Convert LAN to WAN.
 It is also called Modem

Imp Points
 Connect LAN to WAN
 Find Best Rout
 Work as Modem
 Work as Gateway
 Work as Bridge
 Access Point

Types of Router:-

1.Wired Router(DSL Router, ADSL Router)

2.Wireless Router(DSL Router, ADSL Router)

Page 460
What is Modem:-
 This is stand for Modulator and Demodulator
 Modulator:- Modulator means convert digital signal into Analog Signal
 Demodulator:- Demodulator means convert Analog Signal into Digital Signal
 Modem help us to transmit Data from one Comp
Computer to another Computer using Telephone Line.
L
 Modem Basically used for Access the Internet.
 A Modem is a Network device that both Modulates and Demodulates analog Carrier signals for encoding and
decoding digital information for processing.
 The most common use for modems is for both sending and receiving of the digital information between
personal computers. This information used to be transmitted over telephone lines
lines.

Types of Modem:-
There are 3 types of Modem

1.Internal Modem:-
 An Internal Modem is a Circuit Board that can attached inside the System through Expension Slots.

2. External Modem:-
 An External Modem is attached to the Computer System with the help Serial Port(Com-1
Port(Com or Com-2).

3.Wifi Modem:-
 A Wireless Modem transmit data through Air(Unique Media) instead of Cable(Guide Media)
 It is also called Radio Frequency Modem.

Page 461
What is Gateway
 Gateway is a Networking device acts as an entrance(Gate) for another network.
 It is used to routes the traffic from an internal network to the outside network and work
as a "Gate" between two networks.
 It often acts as Firewall or Router.

Page 462
What is Bridge:-
A Bridge is
s a type of computer network device that provides interconnection with other bridge networks that use the
same protocol. Bridge devices work at the data link layer of the OSI model, connecting two different networks together
and providing communication between them.

*Intelligent than HUB

*layer-2 device

*used to connect multiple network segment.

*filter data traffic

*Bridge reduce the amount of traffic on a LAN by dividing it into two segments.

*it connect two or more LAN Network.

*The major different between the Bridge and repeater is that Bridge has a filtering capability.

Page 463
What is Firewall
In computing, a firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. A firewall typically establishes a
barrier between a trusted internal network and untrusted extern
external
al network, such as the Internet.

A firewall is a virtual 'wall' between your computer and the outside world.

There are two types of firewall:


firewall:-
Software firewalls:-
Software firewalls are designed to protect a computer by blocking certain programs from
sending and receiving information from a local network or the Internet.

Hardware firewalls:-
Hardware firewalls are found on most network routers and can be configured through the router
setup screen.

What is Repeater
 A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or topological network boundary than what would be capable with the original signal.
 It regenerates your signals.

Page 464
8.What is Topology:-
Topology is the Pattern / Design of Network device which describe the way to Connected Device in the Network.

Types of Topology
 Star Topology

 Bus Topology

 Ring Topology

 Tree Topology

 Mesh Topology

 Hybrid Topology

1.Star Topology:-
Star Topology is one of the most common network setups.
In this configuration, every node connects to a central network device, like a hub, switch.
The central network device acts as a server and the peripheral devices act as clients.

Advantages of Star Topology

 Centralized management of the network, through th


thee use of the central computer, hub, or switch.

 Easy to add another computer to the network.

 If one computer on the network fails, the rest of the network continues to function normally.

Disadvantages of Star Topology

 May have a higher cost to implement,


 If the central computer, hub, or switch fails, the entire network goes down and all computers are
disconnected from the network.

Page 465
2.Bus Topology:-
Bus Topology is a network setup where each computer and network device is connected to a single cable
or backbone. Network card, RJ-45 Network cable is used to connect them together.

Advantages of BUS Topology


 It works well when you have a small network.

 It's the easiest network topology


pology for connecting computers.

 It requires less cable length than a star topology.

Disadvantages of BUS Topology


 Bus topology is not great for large networks.

 If a main cable is damaged, the network fails.

 It can be hard to troubleshoot individual device issues.

Page 466
3.Ring Topology:-
A Ring Topology is a network configuration in which device connections create a
circular data path.
Ring Topologies may be used in either LANs or WANs.
the ring topology was most commonly used in schools, offices, a
and
nd smaller buildings where
networks were smaller.

Advantages of Ring Topology


 Data can transfer between workstations at high speeds.

 Additional workstations can be added without impacting performance of the network.

Disadvantages of Ring Topology


 The entire network will be impacted if one workstation shuts down.

 more expensive than and hubs/switches.

Page 467
4.Tree Topology:-
 A Tree Topology is a special type of structure in which many connected elements are arranged like the branches of
a tree.
 Tree Topology is used in corporate Network.
 Tree Topology is also known as a Star Bus Topology because it combination of Star and Bus Topology.

5.Mesh Topology:-
Mesh Topology commonly used for wireless networks.

Advantages of Mesh Topology


 Adding additional devices does not disrupt data transmission between other devices.

 Manages high amounts of traffic, because multiple devices can transmit data simultaneously.

Disadvantages of Mesh Topology


 The cost to implement is higher than other network topol
topologies

Page 468
6.Hybrid Topology:-
A Hybrid Topology is a type of network topology that uses two or more differing network Topologies.
These topologies include a mix Of Star Topology Bus Topology, Ring Topology, Mesh Topology, Tree Topology.

Page 469
9.IP Address
Agenda:-
i) What is IP Address
ii) Types of IP Address
iii) What is Subnet Mask.
iv)How to set the IP Address
v)How to get the IP Address

i) What is IP Address
 IP Address is an Unique address mostly used by computers to communicate over a network.
 A device
vice on the Network needs an IP Address to Communicate with the other devices.
 IP address is a unique 32-bit
bit logical address assigned to each device which is connected to a network.
 An IP address is used to communicate with various networking devices and operates at network layer.
 IP address is similar to Telephone number which is unique.

ii) Types of IP Address:-


There are two types of IP address

1. IPv4 Address

2. IPv6 Address

IP-v4 Address:-
IPv4 addresses are 32 bits long (4 bytes).

An example of an IPv4 address is 192.168.1.1

IP-v6 Address:-
A major advantage of IPv6 is that it uses 128 bits (16 bytes) of data to store an unique
addresses 340,282,366,920,938,463,463,374,607,431,768,211,456.
The size of IPv6's address is much, much larger than IPv4.

Page 470
IPv4 address classes
With an IPv4 address is divided into 5 classes,

Class A
Class B
Class C
Class D
Class E

 While only A, B, and C are commonly used.


 Each class allows for a range of valid IP addresses.
 Every IPv4 address is broken down into four octets and separated by dot (.)

Class Address range Supports

Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.

Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.

Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.

Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.

Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or research and development purposes.

Page 471
Note:-
Ranges 127.0.0.1 are reserved for the loopback address or localhost address.

And

Range 255.255.255.255 Broadcasts to all hosts on the local network.

Class A IP Address:-

Class A address Consists of 8


8-bit network ID and 24-bit host ID.

Decimal Value From 1 to 127.

Class B IP Address:-

Class B address Consists of 16


16-bit network ID and 16-bit host ID.

Decimal value from 128 to 191.

Class C IP Address:-

Class C address Consists of 24


24-bit network ID and 8-bit host ID.

Decimal value from 192 to 223.

Class D IP Address:-

Class D address is designed for multicasting. Each address in this class defined a particular group of hosts
over the internet.

This class of address consists of only one block of address.

Value From 224 to 239.

Class E IP Address:-

Class E address is reserved for future and experimental use.

Decimal Value from 240 to


o 255

Page 472
iii) What is Subnet Mask:
Mask:-
 A Subnet mask specifies which part of an IP address is reserved for the network use and which part is available for host use.

 Each IP Address is really made up of two different Pieces

1.Network Portion:-Define
Define the Network Address

2.Host Portion:- Defines the Hosts on that Specific Network.

iv) How to set the IP Address


Win+Rncpa.cplRC
RC on Ethernet
EthernetPropertiesIPV4Set
Set IP Address(192.168.1.1)OK.
Address(192.168.1.1)

v) How to get the IP Address


Win+Rncpa.cplRC on Ethernet
PropertiesIPV4.
OR
Win+RcmdOKipconfigEnterKey
EnterKey.

Page 473
10.OSI Model
 This is stand for Open System Interconnection.

 OSI Model was developed by the ISO (International Standard Organization) to


describe the flow of data/information from one Computer to another computer.

 OSI Model is called ISO OSI Reference Model.

 it is a Conceptual Model that has 7 Layer.

7.Application Layer
6.Presentation Layer
5.Session Layer
4.Transport Layer
3.Network Layer
2.Data Link Layer
1.Physical Layer.

 All the Layer of OSI Model use different protocols.

 Protocol defines the procedure that is to be followed during data Transmission from
one device to other device.

Page 474
1.Application Layer
 Application Layer is the Seven Layer of the OSI Model.

 Application Provides the means for the User an access information on the Network using an application.

 Application is also support service such as Email, Re


Remote File access ,transfer and shared database Management.

 Application Layer Provide an interface for the use


user to interact with the Application.

 Application Layer provides interface between users and machines.

 Protocols of Application Layer are: HTTP, HTTPS, FTP, Telnet, DNS, SMTP, POP3, IMAP.

2.Presentation Layer
 Presentation Layer is the Sixth Layer of the OSI Model.

 Presentation layer deals with Syntax and Semantics of the data exchanged between two devices.

 Presentation Layer responds to the requests sent by the Application layer.

 Presentation Layer responsible for delivering the forms of Text, Graphics, Audio, Video information that is to be sent
to the user.

 Presentation Layer Translate, Compress the Data, Encoding Scheme and Encryption.

 Protocols of Presentation Layer are:JPEG,BMP,GIF,PNG,MP3,MIDI, ASCII and ANSI etc.

3.Session Layer
 Session Layer is the Fifth Layer of the OSI Model

 Session Layer responsible for Validating establish, Manage, Synchronize and terminate Connation between the
Computers/User.

 Protocols of Session Layer are: DBMS, SQL,ASP, NTF etc

Page 475
4.Transport Layer
 Transport Layer is the Forth Layer of the OSI Model.

 Transport layer is responsible for source to destination delivery of the entire Message.

 Transport Layer is responsible for control of Data flow and, if an error occurs, reconnect and re-transmit
re .

 Function:- Handshaking, Acknowledgement


nowledgement and Sequencing.

 Protocols of Transport Layer are: TCP, UDP..etc

5.Network Layer
 Network layer is the Third Layer of the OSI Model.

 Network layer is used for communicate to remote networks.

 Network responsible for Routing and Logical Address.

 Network Layer manage Hardware Components,

 Router
 NIC (Network Interface Card)
 Function: Sorting, Filtering and distribution.

 Routed Protocols of Network Layer are: RIP,OPSF..etc.

6.Data Link Layer


 Data link Layer is the Second Layer of OSI Model.

 Data link Layer Handle, data transfer between Network and the Physical Layer.

 *Data Link Layer manage Hardware Components,

 Switch
 Bridge

 Function: Error detection and Control of data uniqueness.

 MAC address Protocols of Data link are: Frame Relay, ATM,HDLC, SLIP etc.

Page 476
7.Physical Layer
 Physical Layer is the First Layer of the OSI Model.

 Physical Layer is used to establish or Terminate a Connection to a Communication medium.

 Physical Layer receive data from the Upper Layer called Data Link Layer.

 Physical Layer convert received data into bit stream.

 Physical Layer manage Hardware Components,

 HUB
 Repeater
 Cable
 Connector…etc

Page 477
Diagram:-

Page 478
11.Computer Virus
Agenda:-
1.What is Computer Virus?
2.Types of Computer Virus
3.Signs of Virus Infection

वायरस, वषाण)ु
What is Computer Virus?(वायरस
 This is stand for Vital Information Resources Under Seize
 Computer Virus is a piece of code which is capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data.
 A computer virus is a malicious program that self
self-replicates
replicates by copying itself to another program.
 Virus is also Called Malware / Badware
 Viruses spread is through:
 EE-mails
 visiting an infected website
 clicking on an executable file,
 viewing an infecte
infected advertisement
 USB Pen drives and Hard disk.

2.Types of Malware:-(Malicious
(Malicious + Software )

1. Virus
2. Worm
3.Trojan Horse
4.Adware
5.Spyware
6.Ransomware
7.Scareware
8.Backdoor
9.Rootkits

Page 479
3.Signs of Virus Infection

Computer user to be aware of these warning signs:

 Slower system performance

 Pop-ups
ups bombarding the screen

 Files duplicating on their own

 New files or programs in the computer

 Files, folders or programs getting deleted or corrupted

 The sound of a hard drive

 Infect hardware and software

How does a computer virus operate?

A computer virus operates in many ways.

 Delete Temporary Files

 Reinstall the damaged Software

 Window Firewall ON

 Install Antivirus.

Meanings:-
1.Malicious:-Bura Chahane Wala

2.Replicates:-Dohrana

3.Spread:- Failana

4.infect:-Ganda krna

5.Vulnerable:-Chapet me / kamjor

6.intent:- irada

7.prey:-Shikaar Krna

8.christened:- Naam karan krna.

9.vital:- Mahatwapurn

Page 480
12.What is Antivirus(AV Software)
 Antivirus software also known as anti
anti-malware is a computer program used to prevent, detect, and remove
Virus.
 Antivirus software was originally developed to dete
detect
ct and remove computer viruses.

List of Antivirus Manufacturer Company Name:-

1. Quick Heal Antivirus

2. Guardian Antivirus

3. Avast Antivirus

4. AVG Antivirus

5. Avira Antivirus

6. Kaspersky Antivirus

7. McAfee Antivirus

8. Symantec Norton Antivirus


irus

9. Microsoft Security Essentials

10. Prodot Antivirus

How to Scan Virus:-


RC on Drive(C:,D:,E:,F:….)-->Scan
>Scan

Page 481
13.Practical
Agenda:-
1. How to Assign IP Address(Set IP Address)
2. How to Check IP Address(Get IP Address)
3. How to Get and Set Host Name.
4. How to Ping Computer
5. How to Share Data from one Computer to other Computer.
6. How to Access the Shared Data
7.. Remote Desktop Connection for LAN (MSTSC)
8. Remote Access for WAN (Any Desk))

1. How to Assign IP Address(Set IP Address)


Win+Rncpa.cplOkRC
RC on Ethernet
EthernetPropertiesdbClick on IPV- 4

Obtain an IP Address automatically:- Provide by DHCP Server Automatically

Use the following IP Address:-


IP Address:- 192.168.1.1
Subnet Mask:- 255.255.255.0
Default Gateway:
Gateway:-
Preferred DNS Server:
Server:-
Alternative DNS Server:
Server:-
ApplyOk

2. How to Check IP Address(Get IP Address)

Win+RcmdOK
C:\>ipconfig

Output:-
IP Address:- 192.168.1.1
Subnet Mask:- 255.255.255.0

3. How to Set and Get Host Name

Win+RcmdOK

C:\>hostname
Output:-  Sonisoft001

Page 482
4. How to Ping Computer
*Connect two Computer by LAN Cable.
*Assign Same range IP Address of Both Computer
*Ping Both Computer:-
Win+Rcmd
cmdokPing 192.168.1.1 (Ping own PC)
Win+Rcmd
cmdokPing 192.168.1.2 (Ping other PC)

Note:- if Both PC are Ping Properly then PC have Successfully in the Network.

5. How to Share Data from one Computer to other Computer.


*RC on FolderPropertiesSharingAdvanced
Advanced Sharing
SharingCheck Share this FolderPermissions
Permissions

Allow Full Control ApplyOkApply


ApplyOkClose.

6. How to Access the Shared Data


Win+R\\1.1.1.1

User Name:- Dileep

Password:-Soni@123
Soni@123OK

7.. Remote Desktop Connection for LAN ((mstsc)


Remote Desktop is a program that allows a user to connect to a computer in other Location.

How to open Remote Desktop Connection for Local Area Network


Win+R-->mstsc-->Ok-->Sonisoft001-->Connect
>Connect

8.. Remote Access for WAN (Any Desk)


Download and install Remote Access Software like,
*AnyDesk

*AAMMYY Admin

*TeamViewer

=======================Networking has been Completed======================

Page 483

You might also like