SlideShare a Scribd company logo
NETWORKING PRESENTATION BY CAS
GROUP
 PASANG SHERPA(SPEACIALITY –
HARDWARE+ NETWORKING+SERVER-
TEACHER)
 BIBEK CHAUDHARY(SPEACIALITY –
HARDWARE+ NETWORKING+SERVER-
TECHNICIAN)
AND OUR SUPPORT TEAM FROM CAS GROUP
 Ashok Subedi
 Saundarya Subedi
 Santosh Subedi
 Arun Banjara
 Kiran Regmi
 Suraj Katwal
 Rajesh Bhattarai
CAS
WHAT IS CAS?
 CAS stands for “CSIT ASCOL Society”
 It indicates the unity among every IT team in ASCOL
college in IT field
 Our motto is to teach and learn together from base to
the top regarding any new technology and to make
every IT student skilled as they should be being IT
student and to unleash the technological potential of
the student.
 Our slogan we believe in doing practically rather then
wasting time in discussing
 CAS is a social group for all the beginner,
intermediate and expert people.
TODAYS TOPICS HIGHLIGHTS
 Virtual networking
 Wired networking
 Wireless networking
 And other small topics
WHAT IS VIRTUAL MACHINE?
 Here Virtual machine means a software
which provide us a platform to create as
many virtual computers depending upon
system configuration of our computer.
 Mostly used virtual machine
 1.Oracle VM Virtual box {freeware}
 2.VM Ware {pay money}
ADVANTAGES OF VIRTUAL MACHINE
 Create a independent virtual computer
 Different OS can be installed
 we can manage RAM, HDD, Processor, ODD, pendrive
etc
 If virtual computer is damaged then we can create new
virtual computer, it does not harm any of our system files
and our document.
 By using virtual machine many people have been able to
be familiar with different type of OS. Eg linux, windows,
MAC, Sun Solaris etc.
 New software can be tried before use in real machine.
 Every hacking, Networking, can be learned by creating
virtual computers.
WHY SHOULD WE USE VIRTUAL MACHINE?
 We should use virtual machine in order to
practice and to learn.
 So that we don’t make any mistake on our
real machine.
 To try new software and new ideas.
POWER ISO AND ISO IMAGE
Power iso is a software which help us to create
and extract zip type of file which is also called
image. it help us to create duplicates of the
films in cd, or software from a cd or to zip any
file.
 it can create different extension images such
as
 1. .iso
 2. .daa
 3 .bin
ISO IMAGE
 We can create iso image for using virtual
machine because in virtual machine we can
open iso image as an dvd-rom.
WHAT IS NETWORKING?
 Networking is connection of two or more
computers with wire or wireless connection
to share it’s available resources.
 Such as
 Harddisk, cd-rom, printer, software and files
etc
 Important note- we don’t need internet to do
networking.
ADVANTAGES OF NETWORKING
 Helps us to share available resources such as
printer, scanner, cd-rom, harddisk
 Help us in communication such as calling,
messaging, etc
 Help us to solve problem staying in same place.
E.g remote desktop connection
 Makes our daily work easier.
 RIS(Remote Installation Service)
 Internet sharing
DISADVANTAGES OF NETWORKING
 If one computer is infected with viruses then
whole computer will be infected by viruses.
 If switch is not working then whole network
system does not work.
 etc
TYPES OF NETWORKING
 LAN
 MAN
 WAN
 PAIR TO PAIR NETWORKING
 SERVER CLIENT NETWORKING
LAN(LOCAL AREA NETWORKING)
 The networking done in small area.
 i.e within room or from one room to another
or within a building
 E.g school, colleges, offices, institute
 And today we will do LAN networking with
wire and wireless i.e wifi.
SIMPLE LAN NETWORK WITH SWITCH ONLY
COMPLEX LAN WITH ROUTER AND WIFI
MAN(METROPOLITAN AREA NETWORK)
 . A network connecting computers over a
large geographical area, such as a city or
school district.
MAN
WAN(WIDE AREA NETWORKING)
 The networking in wide area.
 E.g internet
WAN
NETWORKING CAN BE DONE BY DIFFERENT
WAYS
 1. WITH COMPUTER NAME
 2.WITH IP ADDRESS
 TYPES
 CLASS A
 CLASS B
 CLASS C
TODAY WE WILL DO LAN NETWORKING WITH
COMPUTER NAMES
 Because we are going to do networking in
small area i.e in a hall. But before that we will
practice networking in virtual machine.
 After that we will do networking with wires
and wireless devices.
NETWORKING WITH COMPUTER NAMES
 It is the easiest way of networking because
here we don’t have to know what is static
and dynamic IP address is.
 But in reality, while doing networking,
computer name uses dynamic ip address.
 Dynamic ip address means ip address
changes frequently.
 It is used widely
NETWORING WITH COMPUTER NAMES
 RULES
 Some rules must be followed in order to
make a networking of the computers
 1.Computer name must be different but
workgroup must be same.
 2.Firewall must be off
 3.Guest must be enabled
 4. Guest must be given access in network
1.COMPUTER NAME MUST BE DIFFERENT AND
WORKGROUP MUST BE SAME
 Right click on my computer.
 Properties  Computer name  Change
 Give the computer name and workgroup.
 Restart your computer.
2.FIREWALL MUST BE OFF
 Start  control panel  firewall  off
 Or
 Win+r  firewall.cpl  off
3.GUEST MUST BE ENABLED
 Right click on my computer
 Manage  local users and groups 
users  double click on guest  remove
tick from account is disabled.
 Or
 Win+r  lusrmgr.msc  users  double
click on guest  remove tick from account
is disabled.
4.GUEST MUST BE GIVEN ACCESS IN NETWORK
 Start  control panel  administrative tools
 local security policy  local policy 
user right assignment  double click on
deny access to this computer from network
 select guest  remove  ok
 Or
 Win+r  secpol.msc  local policy  user
right assignment  double click on deny
access to this computer from network 
select guest  remove  ok
THE THINGS WE CAN DO AFTER WE ARE IN
NETWORK
 1.File sharing, drive sharing, printer N
scanner sharing
 2. Netmeeting – help us in chatting, free
calls and desktop sharing.
 3.Remote desktop connection – help us to
control our friend computer.
 4.shutting down network computers.
1.FILE SHARING, DRIVE SHARING, PRINTER N
SCANNER SHARING
 Folder sharing
 Create a folder and give name right click
on folder properties sharing tick on
share this folder on network and allow
network users to change my file apply
ok
 Same method for cd-rom and drive sharing.
2. NETMEETING – HELP US IN CHATTING, FREE
CALLS AND DESKTOP SHARING.
 Start  run  conf fill all the empty
area as needed next next next
next next next next next finish
3.REMOTE DESKTOP CONNECTION – HELP US TO
CONTROL OUR FRIEND COMPUTER.
 Start  control panel  administrative tools
 local security policy  local policy
security policylimit local account use of
blank password to console logon only 
disable ok
 Right click on my computer properties 
remote  tick on allow users to connect
remotely to this computer  apply  ok
 Start all programs  accessories 
communication  remote desktop
connection
 Type computer name and click connect
4.SHUTTING DOWN NETWORK COMPUTERS.
 Start  control panel  administrative
tools  local security policy  local
policy  user right assignment double
click on force shutdown from remote
computer add users or groups  type
everyone check names ok  apply 
ok
 Start  run cmd  type shutdown –I
add type computer name to shutdown 
ok add comment  ok
INFRASTRUCTURE NEEDED FOR WIRED LOCAL
AREA NETWORKING
INFRASTRUCTURE NEEDED FOR WIRELESS
LOCAL AREA NETWORKING
 Router
 Access point
 Satellite
ROUTER
SWITCH
SIMPLE LAN NETWORK WITH SWITCH ONLY
COMPLEX LAN WITH ROUTER AND WIFI

More Related Content

Viewers also liked

Create a facebook account without surname (second name)
Create a facebook account without surname (second name)Create a facebook account without surname (second name)
Create a facebook account without surname (second name)
Suraj Katwal
 
Removing Your Last Name From Facebook [Updated]
Removing Your Last Name From Facebook [Updated]Removing Your Last Name From Facebook [Updated]
Removing Your Last Name From Facebook [Updated]
Suraj Katwal
 
itft_system admin
itft_system adminitft_system admin
itft_system admin
Swati Aggarwal
 
MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01
Computer Networking
 
Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...
Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...
Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...Cisco Russia
 
Basic Computer Hardware
Basic Computer HardwareBasic Computer Hardware
Basic Computer Hardware
technoed48
 
Chapter08 Implementing And Managing Printers
Chapter08      Implementing And  Managing  PrintersChapter08      Implementing And  Managing  Printers
Chapter08 Implementing And Managing PrintersRaja Waseem Akhtar
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6
Andreas Taudte
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Sahira Khan
 
Samba server
Samba serverSamba server
Samba server
Santosh Khadsare
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
EILLEN IVY PORTUGUEZ
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Viewers also liked (15)

Create a facebook account without surname (second name)
Create a facebook account without surname (second name)Create a facebook account without surname (second name)
Create a facebook account without surname (second name)
 
Removing Your Last Name From Facebook [Updated]
Removing Your Last Name From Facebook [Updated]Removing Your Last Name From Facebook [Updated]
Removing Your Last Name From Facebook [Updated]
 
itft_system admin
itft_system adminitft_system admin
itft_system admin
 
Palmer 6
Palmer 6Palmer 6
Palmer 6
 
MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01
 
Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...
Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...
Сisco IP NGN: сервисный уровень и управление IP-адресацией в сетях операторов...
 
Basic Computer Hardware
Basic Computer HardwareBasic Computer Hardware
Basic Computer Hardware
 
Chapter08 Implementing And Managing Printers
Chapter08      Implementing And  Managing  PrintersChapter08      Implementing And  Managing  Printers
Chapter08 Implementing And Managing Printers
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6
 
Ch12
Ch12Ch12
Ch12
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)
 
Samba server
Samba serverSamba server
Samba server
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to Campaign of networking in csit association of Nepal

Basic Networking
Basic NetworkingBasic Networking
Basic Networking
Bakht Khan
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
Kumar Gaurav
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer TroubleshootingRence Montanes
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
Alithea Barbosa
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
MLG College of Learning, Inc
 
Safecrossroads ep01
Safecrossroads ep01Safecrossroads ep01
Safecrossroads ep01
simpletonsafe
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
Hacking tools and the case for layered security
Hacking tools and the case for layered securityHacking tools and the case for layered security
Hacking tools and the case for layered security
JDTechSolutions
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
smumbahelp
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
mandarshetye45
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
Susan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a company
rosu555
 
Assignment 1
Assignment 1  Assignment 1
Assignment 1
MDHASNAIN23
 
cluster research
cluster researchcluster research
cluster researchWill Dixon
 
Revision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdfRevision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdf
ManasGupta211804
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ipKumar
 

Similar to Campaign of networking in csit association of Nepal (20)

Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Safecrossroads ep01
Safecrossroads ep01Safecrossroads ep01
Safecrossroads ep01
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Hacking tools and the case for layered security
Hacking tools and the case for layered securityHacking tools and the case for layered security
Hacking tools and the case for layered security
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a company
 
Assignment 1
Assignment 1  Assignment 1
Assignment 1
 
cluster research
cluster researchcluster research
cluster research
 
Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
Revision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdfRevision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdf
 
Routing_Article
Routing_ArticleRouting_Article
Routing_Article
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ip
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Campaign of networking in csit association of Nepal

  • 1. NETWORKING PRESENTATION BY CAS GROUP  PASANG SHERPA(SPEACIALITY – HARDWARE+ NETWORKING+SERVER- TEACHER)  BIBEK CHAUDHARY(SPEACIALITY – HARDWARE+ NETWORKING+SERVER- TECHNICIAN)
  • 2. AND OUR SUPPORT TEAM FROM CAS GROUP  Ashok Subedi  Saundarya Subedi  Santosh Subedi  Arun Banjara  Kiran Regmi  Suraj Katwal  Rajesh Bhattarai
  • 3. CAS
  • 4. WHAT IS CAS?  CAS stands for “CSIT ASCOL Society”  It indicates the unity among every IT team in ASCOL college in IT field  Our motto is to teach and learn together from base to the top regarding any new technology and to make every IT student skilled as they should be being IT student and to unleash the technological potential of the student.  Our slogan we believe in doing practically rather then wasting time in discussing  CAS is a social group for all the beginner, intermediate and expert people.
  • 5. TODAYS TOPICS HIGHLIGHTS  Virtual networking  Wired networking  Wireless networking  And other small topics
  • 6. WHAT IS VIRTUAL MACHINE?  Here Virtual machine means a software which provide us a platform to create as many virtual computers depending upon system configuration of our computer.  Mostly used virtual machine  1.Oracle VM Virtual box {freeware}  2.VM Ware {pay money}
  • 7. ADVANTAGES OF VIRTUAL MACHINE  Create a independent virtual computer  Different OS can be installed  we can manage RAM, HDD, Processor, ODD, pendrive etc  If virtual computer is damaged then we can create new virtual computer, it does not harm any of our system files and our document.  By using virtual machine many people have been able to be familiar with different type of OS. Eg linux, windows, MAC, Sun Solaris etc.  New software can be tried before use in real machine.  Every hacking, Networking, can be learned by creating virtual computers.
  • 8. WHY SHOULD WE USE VIRTUAL MACHINE?  We should use virtual machine in order to practice and to learn.  So that we don’t make any mistake on our real machine.  To try new software and new ideas.
  • 9. POWER ISO AND ISO IMAGE Power iso is a software which help us to create and extract zip type of file which is also called image. it help us to create duplicates of the films in cd, or software from a cd or to zip any file.  it can create different extension images such as  1. .iso  2. .daa  3 .bin
  • 10. ISO IMAGE  We can create iso image for using virtual machine because in virtual machine we can open iso image as an dvd-rom.
  • 11. WHAT IS NETWORKING?  Networking is connection of two or more computers with wire or wireless connection to share it’s available resources.  Such as  Harddisk, cd-rom, printer, software and files etc  Important note- we don’t need internet to do networking.
  • 12. ADVANTAGES OF NETWORKING  Helps us to share available resources such as printer, scanner, cd-rom, harddisk  Help us in communication such as calling, messaging, etc  Help us to solve problem staying in same place. E.g remote desktop connection  Makes our daily work easier.  RIS(Remote Installation Service)  Internet sharing
  • 13. DISADVANTAGES OF NETWORKING  If one computer is infected with viruses then whole computer will be infected by viruses.  If switch is not working then whole network system does not work.  etc
  • 14. TYPES OF NETWORKING  LAN  MAN  WAN  PAIR TO PAIR NETWORKING  SERVER CLIENT NETWORKING
  • 15. LAN(LOCAL AREA NETWORKING)  The networking done in small area.  i.e within room or from one room to another or within a building  E.g school, colleges, offices, institute  And today we will do LAN networking with wire and wireless i.e wifi.
  • 16. SIMPLE LAN NETWORK WITH SWITCH ONLY
  • 17. COMPLEX LAN WITH ROUTER AND WIFI
  • 18. MAN(METROPOLITAN AREA NETWORK)  . A network connecting computers over a large geographical area, such as a city or school district.
  • 19. MAN
  • 20. WAN(WIDE AREA NETWORKING)  The networking in wide area.  E.g internet
  • 21. WAN
  • 22. NETWORKING CAN BE DONE BY DIFFERENT WAYS  1. WITH COMPUTER NAME  2.WITH IP ADDRESS  TYPES  CLASS A  CLASS B  CLASS C
  • 23. TODAY WE WILL DO LAN NETWORKING WITH COMPUTER NAMES  Because we are going to do networking in small area i.e in a hall. But before that we will practice networking in virtual machine.  After that we will do networking with wires and wireless devices.
  • 24. NETWORKING WITH COMPUTER NAMES  It is the easiest way of networking because here we don’t have to know what is static and dynamic IP address is.  But in reality, while doing networking, computer name uses dynamic ip address.  Dynamic ip address means ip address changes frequently.  It is used widely
  • 25. NETWORING WITH COMPUTER NAMES  RULES  Some rules must be followed in order to make a networking of the computers  1.Computer name must be different but workgroup must be same.  2.Firewall must be off  3.Guest must be enabled  4. Guest must be given access in network
  • 26. 1.COMPUTER NAME MUST BE DIFFERENT AND WORKGROUP MUST BE SAME  Right click on my computer.  Properties  Computer name  Change  Give the computer name and workgroup.  Restart your computer.
  • 27. 2.FIREWALL MUST BE OFF  Start  control panel  firewall  off  Or  Win+r  firewall.cpl  off
  • 28. 3.GUEST MUST BE ENABLED  Right click on my computer  Manage  local users and groups  users  double click on guest  remove tick from account is disabled.  Or  Win+r  lusrmgr.msc  users  double click on guest  remove tick from account is disabled.
  • 29. 4.GUEST MUST BE GIVEN ACCESS IN NETWORK  Start  control panel  administrative tools  local security policy  local policy  user right assignment  double click on deny access to this computer from network  select guest  remove  ok  Or  Win+r  secpol.msc  local policy  user right assignment  double click on deny access to this computer from network  select guest  remove  ok
  • 30. THE THINGS WE CAN DO AFTER WE ARE IN NETWORK  1.File sharing, drive sharing, printer N scanner sharing  2. Netmeeting – help us in chatting, free calls and desktop sharing.  3.Remote desktop connection – help us to control our friend computer.  4.shutting down network computers.
  • 31. 1.FILE SHARING, DRIVE SHARING, PRINTER N SCANNER SHARING  Folder sharing  Create a folder and give name right click on folder properties sharing tick on share this folder on network and allow network users to change my file apply ok  Same method for cd-rom and drive sharing.
  • 32. 2. NETMEETING – HELP US IN CHATTING, FREE CALLS AND DESKTOP SHARING.  Start  run  conf fill all the empty area as needed next next next next next next next next finish
  • 33. 3.REMOTE DESKTOP CONNECTION – HELP US TO CONTROL OUR FRIEND COMPUTER.  Start  control panel  administrative tools  local security policy  local policy security policylimit local account use of blank password to console logon only  disable ok  Right click on my computer properties  remote  tick on allow users to connect remotely to this computer  apply  ok  Start all programs  accessories  communication  remote desktop connection  Type computer name and click connect
  • 34. 4.SHUTTING DOWN NETWORK COMPUTERS.  Start  control panel  administrative tools  local security policy  local policy  user right assignment double click on force shutdown from remote computer add users or groups  type everyone check names ok  apply  ok  Start  run cmd  type shutdown –I add type computer name to shutdown  ok add comment  ok
  • 35. INFRASTRUCTURE NEEDED FOR WIRED LOCAL AREA NETWORKING
  • 36. INFRASTRUCTURE NEEDED FOR WIRELESS LOCAL AREA NETWORKING  Router  Access point  Satellite
  • 39. SIMPLE LAN NETWORK WITH SWITCH ONLY
  • 40. COMPLEX LAN WITH ROUTER AND WIFI