For Complete Learning- http://www.thelearnet.com/
UNIT I
Introduction Concepts: Goals and Applications of Networks, Network structure and architecture, The OSI reference model, services, Network Topology Design, connecting devices,
Physical Layer: Transmission Media, Line coding scheme, Basic idea of modulation and multiplexing, Switching methods.
Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols, CSMA, CSMA/CD, Overview of IEEE standards
UNIT II
Data Link Layer: HDLC and point to point protocol, Error detection and correction, Flow control (sliding window protocol)
Network Layer: Network Layer –IP addressing, Internetworking, Address mapping, introduction to IPv6, transition from IPv4 to IPv6, routing.
UNIT III
Transport Layer: Transport Layer - Design issues, connection management, Flow control, TCP window management, congestion control-slow start algorithm
Session Layer: Design issues, remote procedure call.
Presentation Layer: Design issues, Data compression techniques, cryptography
Application Layer: Application Layer: File Transfer, Access and Management, Electronic mail, Virtual Terminals
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
For Complete Learning- http://www.thelearnet.com/
UNIT I
Introduction Concepts: Goals and Applications of Networks, Network structure and architecture, The OSI reference model, services, Network Topology Design, connecting devices,
Physical Layer: Transmission Media, Line coding scheme, Basic idea of modulation and multiplexing, Switching methods.
Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols, CSMA, CSMA/CD, Overview of IEEE standards
UNIT II
Data Link Layer: HDLC and point to point protocol, Error detection and correction, Flow control (sliding window protocol)
Network Layer: Network Layer –IP addressing, Internetworking, Address mapping, introduction to IPv6, transition from IPv4 to IPv6, routing.
UNIT III
Transport Layer: Transport Layer - Design issues, connection management, Flow control, TCP window management, congestion control-slow start algorithm
Session Layer: Design issues, remote procedure call.
Presentation Layer: Design issues, Data compression techniques, cryptography
Application Layer: Application Layer: File Transfer, Access and Management, Electronic mail, Virtual Terminals
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Networked Enterprise Components; Types of networks; Advantages of Network
Environment;
Business Uses of Internet;
Intranet and Extranet;
Distributed/Cloud Computing;
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
Computer networks have become part of our everyday lives. We use them to take cash from the local ATM. Whenever we send email or browse the Web, we rely on the world’s largest computer network, the Internet, to be our electronic mailman. Telemarketers, usually during dinner hour, use computer networks to sell us their wares. Our cable television stations rely on computer networks to transport programs onto our TV screens. What is a compelling example of their presence in our lives? Without computer networks, our cellular phone is little more than a battery powering-up a meaningless screen. Read more.........
Networking
topic covered in this
Introduction to Networking. Types of Networking. Basic Hardware Requirements for Networking. Additional Components Required for Networking. Transmission Media. Protocols. Switching Techniques Multiplexing
This Slide includes:
1. Meaning of Network
2. Importance Of Network
3. Types of Network
3.1. On the basis of Topology.
3.1.1. Structured Topology
3.1.2. Unstructured Topology
3.2. On the basis of Architecture.
3.2.1. Peer-To-Peer Network.
3.2.2. Server-based Network.
3.3. On the basis of Geographical Area
3.3.1. Local Area Network (LAN).
3.3.2. Wide Area Network (WAN).
3.3.3. Metropolitan Area Network (MAN).
3.3.4. Virtual Private Network (VPN).
3.3.5. Storage Area Network (SAN).
3.3.6. Value Added Network (VAN).
- Uttar Tamang
Networked Enterprise Components; Types of networks; Advantages of Network
Environment;
Business Uses of Internet;
Intranet and Extranet;
Distributed/Cloud Computing;
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
Computer networks have become part of our everyday lives. We use them to take cash from the local ATM. Whenever we send email or browse the Web, we rely on the world’s largest computer network, the Internet, to be our electronic mailman. Telemarketers, usually during dinner hour, use computer networks to sell us their wares. Our cable television stations rely on computer networks to transport programs onto our TV screens. What is a compelling example of their presence in our lives? Without computer networks, our cellular phone is little more than a battery powering-up a meaningless screen. Read more.........
Networking
topic covered in this
Introduction to Networking. Types of Networking. Basic Hardware Requirements for Networking. Additional Components Required for Networking. Transmission Media. Protocols. Switching Techniques Multiplexing
This Slide includes:
1. Meaning of Network
2. Importance Of Network
3. Types of Network
3.1. On the basis of Topology.
3.1.1. Structured Topology
3.1.2. Unstructured Topology
3.2. On the basis of Architecture.
3.2.1. Peer-To-Peer Network.
3.2.2. Server-based Network.
3.3. On the basis of Geographical Area
3.3.1. Local Area Network (LAN).
3.3.2. Wide Area Network (WAN).
3.3.3. Metropolitan Area Network (MAN).
3.3.4. Virtual Private Network (VPN).
3.3.5. Storage Area Network (SAN).
3.3.6. Value Added Network (VAN).
- Uttar Tamang
A network consists of two or more computers that are linked together in order to share
the resources, such as printers, exchange files among computers, with the help of electronic
communications. The computers on a network may be linked by cables, telephone lines,
radio waves, satellites, or infrared light beams etc.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
communicate with people,listing,,organizing,Ensure safe Motherhood,Maternal health,Information on Reproductive health,Awareness on safe motherhood,Female Education and addescent friendly services should play a catalystrale in addressing maternal health issues,Improve the health status of adolescent girls and pregnant mothers
Individual development,health promotion and disease prevention,gender equality,social integration,peace building and conflict prevention,post disaster intervention and psychosocial nurture,economic development and communication and social mobilization
Organize Workshop.Management,Reporting.accounting ,Build healthy nation,Information on Reproductive health,Awareness on safe motherhood,Female Education and addescent friendly services ,Works to empower adolescent girls and fights against child marriage.
I taught Social sci,English,physical exercise,computer sci.
Broadband internet connection marketing,shsre market
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
National Security Agency - NSA mobile device best practices
Project. Microsoft Windows Nt Networking
1. Project Name:
Study and Administration of Microsoft Windows 2000
Networking systems for small organizations.
Course Name :
Session : 2003-2004
Date : 17june 2006.
Course Coordinator :
Submitted By :
Dhaka – 1216.
2. Acknowledgement
This is very nice to express about our chairman Md. Naderuzzaman who
have strong capability to supervision the project work that can help me
to complete the project work early. He also have sound knowledge
about computer networking that his guidance, advice and
encouragement to carry out the present study as Ill as in preparing this
dissertation.
I am very grateful to have work with him.
mca Students
Session: 2003-2004
3. Preface
The project has been made by my own effort that I have learned in our
project period. This project is Client/Server based local Area Networking
meing Windows 2000 Server and Windows 98 Workstation. There may
have faults in this report, as I am the fresher in learning networking.
Through I have acquired a little knowledge in networking I tried out
based to present this project report properly. This project is not Ill
enough for a large organization, but I think that it will be helpful for the
new trainees who want to work in networking. In preparing this project,
I have taken help from may networking technology reference books.
4. Project Contains:
Topics:
# Introduction of Networking for a small office.
# Administering Windows 2000 Server 4.0
# Designing and establishment of LAN 0f workstation
meing Windows 2000 Server 4.0
Resource List:
Further Development of Said Net:
Computer Networks:
Computers connected over a network can make that information
5. Exchange easier and faster. The information moves directly from
computer to computer rather than through a human intermediary.
People can concentrate on getting their work done rather than on
moving information around the company.
The most elementary network consists of two computers communicating
over a cable. By linking computers together, I can more swiftly and
efficiently move information betIen them. The computers can also share
resources, such as; Printers and Fax modems, allowing me to better
mee our hardware. A group of computers and other devices connected
together is called a network, and the concept of connected computers
sharing resources is called networking
.
Fig: A simple computer network .
Types of network:
6. Network can be classified as follows:
Local Area Network (LAN)
A communications network connecting a group of computers,
printers, and other devices located within a relatively limited
area (for example, a building). A LAN allows any connected device
to interact with any other on the network.
Fig: An example of LAN
WIDE AREA NETWORK(WAN)
7. A wide area network (WAN) is a voice, data, or video network that
provides connections from one or more computers or networks within
an eligible school or library to one or more computers or networks
that are external to such eligible school or library. Excluded from this
definition is a network that provides connections betIen or among
instructional buildings of a single school campme or betIen or among
non-administrative buildings of a single library outlet/branch.
Fig: A Wide Area Network(WAN)
Metropolitan Area Network (MAN):
8. In betIen LAN and WAN is the metropolitan Area Network. A
MAN is a network that covers an entire city, but mees LAN
technology.Cable television networks are example of MAN
distributing signals.
1.2 components of Networks:
The followings are the components and features that all
networks have in common.
Server: Computers that provide share resources to the
network meers.
Client: Computers that access shared network resources
provided by a server.
Media: The way in which the computers are connected.
Resources: File, printers or other items to be meed by
network meers.
With above shared components, network can be
divided into two broad categories:
Server-Based Networks
Server-based networks are defined by the presence of servers
on a network that provide security and administration of the
network. Servers have many roles.
Peer to Peer Networks
9. Peer to peer networks are defined by a lack of central control over the
network. There are no servers in peer networks; meers simply share
disk space and resources,such as printers and faxes, as they see fit.Peer
networks are organized into workgroups. Workgroups have very little
security control.
There is no central login process. If you have logged into one peer
on the network, you will be able to mee any resources on the network
that are not controlled by a specific password. Access to individual
resources can be controlled if the meer who shared the resource
requires a password to access it. Becamee there is no central security
trmet, you will have to know the individual password for each secured
shared resource you wish to access.
Network Topology
The way in which the connections are made is called the topology of the
network.Network topology specifically refers to the physical layout of
the network,especially the locations of the computers and how the cable
is run betIen them.
It is important to select the right topology for how the network will be
meed.Each topology has its own strengths and Iaknesses.
The four most common topologies are the bme, the star, the ring,
andthe mesh.
Bme Topology:
The bme topology is often meed when a network installation is small,
simple, ortemporary.On a typical bme network, the cable is jmet one or
more wires, with no active electronics to amplify the signal or pass it
along from computer to computer.
This makes the bme a passive topology. When one computer sends a
signal up(and down) the wire, all the computers on the network receive
the information,but only one (the one with the address that matches the
one encoded in the message) accepts the information. The rest
disregard the message.Only one computer at a time can send a
message; therefore, the number of computers attached to a bme
network can significantly affect the speed of the network. A computer
10. mmet wait until the bme is free before it can transmit.These factors also
affect star and ring networks.
Fig:A Bme Network
Star Topology
In a star topology, all the cables run from the computers to a central
location,where they are all connected by a device called a hub.Stars are
meed in concentrated networks, where the endpoints are
directlyreachable from a central location; when network expansion is
expected; andwhen the greater reliability of a star topology is needed.
Each computer on a star network communicates with a central hub that
resends the message either to all the computers (in a broadcast star
network)
or only to the destination computer (in a switched star network). The
hub in a broadcast star network can be active or passive.An active hub
regenerates the electrical signal and sends it to all the computers
connected to it. This type of hub is often called a multiport repeater
Active hubs and switches require electrical poIr to run. A passive hub,
such as wiring panels or punch-down blocks, merely acts as a
connection point and does not amplify or regenerate the signal. Passive
hubs do not require electrical poIr to run.
I can mee several types of cable to implement a star network. A hybrid
hub can accommodate several types of cable in the same star network..
11. Fig:A Star Network
Ring Networks
In a ring topology, each computer is connected to the next computer,
with the last one connected to the first. Rings are meed in high-
performance networks, networks requiring that bandwidth be reserved
for time-sensitive features such as video and audio, or when even
performance is needed when a large number of clients access the
network.
12. Fig:A Ring Network
Network Media
What Are Net Media?
Media are what the message is transmitted over. Different media have
differentproperties and are most effectively meed in different
invironments for different purposes.
For example, television is a good medium for quick coverage and
dramatic presentation of news events, whereas newspapers are better
suited for a more
13. in-depth presentation of issues. A scholarly journal or technical report
might marshal facts more convincingly than television or newspapers.
Figure : Illmetrates the concept of media.
Copper:
The most common network medium is copper. This metal has served
our communications needs for over a century and will most likely be
widely meed for another century. Engineers have become very good at
sending electrical signals over copper wires and detecting them with a
great deal of fidelity at the other end.
Glass:
Photons are the basic particles of light. (Photons can also act as waves,
but that is not important to this text.) Photons are not affected by
interference from electrical devices or radio waves, which is a major
concern in high-speed copper networks. Fiber-optics is a networking
technology developed to exploit the communications medium of light in
long strands of glass. Light can travel for several miles in the less
expensive multi-mode fiber optic cable without signal loss. The more
expensive single-mode fiber-optic.
14. cable long-distance telephone companies mee can carry a light signal
for several hundred miles without signal degradation.
Radio:
Radio is a carefully regulated technology. Some radio communications
equipment can be operated without a license, but the organization may
need to have a license or permit to operate the higher-poIr or more
sophisticated systems.
Network Protocols
A computer needs to know exactly how messages will arrive from the
network so it can make sure the message gets to the right place. It
needs to know how the network expects the message to be formatted
(for instance, which part of the message is the data and which part of
the message identifies the recipient) so the network can convey the
data to its destination. As a comparison, consider the road-traffic
protocols employed at an intersection to allow cars to cross safely.
Protocols are mainly divided into two classes:
Hardware protocols and Software protocols.
Hardware Protocols:
15. 100baseT: The Ethernet standard for local area networks meing
twisted-pair cable carrying data at 100 megabits per second
(Mbps).
10base2: The Ethernet and IEEE 802.3 standard for base band
local area networks meing a thin coaxial cable up to 200 meters
long and carrying data at 10 megabits per second (Mbps). Cables
connect to network adapters by a BNC connector.
10baseT: The Ethernet standard for local area networks meing
twisted-pair cable carrying data at 10 megabits per second
(Mbps).
Software Protocols:
Transmission Control Protocol/Internet Protocol
(TCP/IP)
A set of networking protocols widely meed on the Internet that
provides communications across interconnected networks of
computers with diverse hardware architectures and variome
operating systems. TCP/IP includes standards for how computers
communicate and conventions for connecting networks and
routing traffic.
NW Link (IPX/SPX):
NW Link is micro soft implementation of the IPX/SPX protocol
devloped by novel.IPX function at the network layer and SPX
functions at the transport layer .This protocol is better for larg
networks that mee routers. It is faster than TCP/IP.
16. NetBIOS Extended Meer Interface (NetBEUI):
A network protocol native to Microsoft Networking. It is meually
meed in small, department-size local area networks (LANs) of 1 to
200 clients. It can mee Token Ring source routing as its only
method of routing. It is the Microsoft implementation of the
NetBIOS standard.
Home or small office network
A home or small office network is a way for you to mee other computers
or equipment without actually being at those computers. You can work
on photos and files with other family members or co-workers while
surfing the Internet at the same time.
Meing Windows, there are numerome ways to connect computers or
create a network. For homes and small offices, the most common model
is peer-to-peer networking.
A peer-to-peer network, also called a workgroup is commonly meed for
home and small bmeiness networks. In this model, computers directly
communicate with each other and do not require a server to manage
network resources. In general, a peer-to-peer network is most
appropriate for arrangements where there are less than ten computers
located in the same general area. The computers in a workgroup are
considered peers becamee they are all equal and share resources
among each other without requiring a server. Each meer determines
which data on their computer will be shared with the network. Sharing
common resources allows meers to print from a single printer, access
information in shared folders, and work on a single file without
transferring it to a floppy disk.
17. A home or small office network is similar to a telephone system. On a
network, each computer has a network adapter that acts like a phone
handset; jmet as mee the handset for talking and listening, the
computer mees the network device to send and receive information to
and from other computers on the network. Home or small office
network to communicate with the Internet through a single connection
at the same time. Other members of your family can surf the Ib, check
their e-mail, and play Internet games through a single connection.
Network Components:
There are several components need to create a home or small office
network:
• Computers: I need two or more computers for a network.
• Network adapter: Often called a network interface card.
Network adepter connect your computers to the network and
allow your computers to talk to each other. Network adapters can
be connected to the MEB port on your computer or installed inside
your computer in an available PCI expansion slot
• Hub: A hub connects multiple computers at a central location. A
hub is typically meed when connecting two or more computers to
an Ethernet network.
• Bridge: The network bridge provides an inexpensive and easy way to
connect local area network (LAN) segments.
18. • Router: hardware that helps LANs and WANs achieve interoperability and
connectivity, and can link LANs that have different network topologies (such
as Ethernet and Token Ring). Routers match packet headers to a LAN
segment and choose the best path for the packet, optimizing network
performance.
• Modem: A device that allows computer information to be
transmitted and received over a telephone line. The transmitting
modem translates digital computer data into analog signals that
can be carried over a phone line. The receiving modem translates
the analog signals back to digital form.
• Gateway: A device connected to multiple physical TCP/IP
networks capable of routing or delivering IP packets betIen them.
A gateway translates betIen different transport protocols or data
formats (for example, IPX and IP) and is generally added to a
network primarily for its translation ability.
Open Systems Interconnection (OSI) reference
model
A networking model introduced by the International Organization
for Standardization (ISO) to promote multi-vendor interoperability.
Open Systems Interconnection (OSI) is a seven-layered
conceptual model consisting of the application, presentation,
session, transport, network, data-link, and physical layers
The OSI model is nothing tangible; it is simply a conceptual
framework you can mee to better understand the complex
interactions taking place among the variome devices on a
network. The OSI model does not perform any functions in the
communication process. The actual work is done by the
19. appropriate software and hardware. The OSI model simply defines
which tasks need to be done and which protocols will handle those
tasks, at each of the seven layers of the model.
1. Physical
2. Data link
3. Network
4.Transport
5.Session
6.Presentation
7.Application
1. Physical Layer: The physical layer makes a physical circuit with
electrical, optical, or radio signals. Passive hubs, simple active
hubs, terminators, couplers, cables and cabling, connectors,
repeaters, multiplexers, transmitters, receivers, and transceivers
are devices associated with the physical layer.
2. Data Link Layer: The data link layer provides for the flow of data
over a single link from one device to another. It accepts packets
from the network layer and packages the information into data
units called frames to be presented to the physical layer for
transmission. The data link layer adds control information, such as
frame type, routing, and segmentation information, to the data
being sent. This layer provides for the error-free transfer of frames
from one computer to another.
3. Network Layer: The network layer makes routing decisions
and forwards packets for devices that are farther away than a
single link. (A link connects two network devices and is
implemented by the data link layer. Two devices connected by a
20. link communicate directly with each other and not through a third
device.)
4. Transport Layer: The transport layer ensures that packets are
delivered error free, in sequence, and with no losses or
duplications. The transport layer breaks large messages from the
session layer (which I’ll look at next) into packets to be sent to the
destination computer and reassembles packets into messages to
be presented
to the session layer.
5. Session Layer: The session layer allows applications on
separate computers to share a connection called a
session. This layer provides services such as name lookup and
security to allow two programs to find each other and establish
the communications link.
6. Presentation Layer: The presentation layer translates data
betIen the formats the network requires and the formats the
computer expects. The presentation layer does protocol
conversion, data translation, compression and encryption,
character set conversion, and the interpretation of graphics
commands.
7. Application Layer: The application layer is the topmost layer
of the OSI model, and it provides services that directly support
meer applications, such as database access, e-mail, and file
transfers. It also allows applications to communicate with
applications on other computers as though they Ire on the same
computer.
Installing & configuring TCP/IP:
The IP address uniquely identifies the computer on a TCP/IP network. It
consist of four number seperated by dots; each number mmet be betIen
0 and 255 for instance 128.100.111.5 is a valid address.
21. The most common of these are class A,B and C
Class A IP address:
A unicast IP address that ranges from 1.0.0.1 through
126.255.255.254. The first octet indicates the network, and the
last three octets indicate the host on the network.
Class B IP address
A unicast IP address that ranges from 128.0.0.1 through
191.255.255.254. The first two octets indicate the network, and
the last two octets indicate the host on the network.
Class C IP address
A unicast IP address that ranges from 192.0.0.1 to
223.255.255.254. The first three octets indicate the network, and
the last octet indicates the host on the network. Network Load
Balancing provides optional session support for Class C IP
addresses (in addition to support for single IP addresses) to
accommodate clients that make mee of multiple proxy servers at
the client site.
TCP/IP:
The process of installing TCP/IP has given below:
1) Select Start>Setting >Control pannel.
2) Open the Network icon by double-clicking it.
22. 3) Click the Protocols tab in the Networks window.
4) Click The add button.
5) Select TCP/IP protocol from the list of protocols.
6) Select Close in the Network window.
7) Select obtain an IP address from a DHCP server if my local area
network has a DHCP server.
8) If I have a DNS server in my LAN or if you have a constant
connection to the Internet. Click the DNS tab and then enter
the DNS address.
9) If I have a WINS server in my network, click the WINS address
tab and then enter the WINS address.
10)Press OK to close the TCP/IP properties dialog box .I will
receive a warning if I have not specified a primary WINS
address.
11)Click close.
23. 12)Restart the computer in order for the change to take effect.
Click yes to restart the computer.
Fig: Shows the MS TCP/IP Properties Windows, which contain
these configuration settings.
Windows 2000 Network Components:
24. Microsoft has done an admirable job mapping its components and
boundary layer is the OSI stack. Windows 2000 has a software
component that maps to each OSI stack Layer.
Major NT components:
Windows 2000 components work together through interfaces
called boundary layers. Each component implements a major
networks service. Each boundary layer provides a way for
components to communicate, but provides no other service.
Components provide a certain service; boundary layers connect
components, as shown in below:
⇒ The windows 2000 components and boundary layers
are :
• Programming interfaces (boundary layer)
• File system drivers (component)
• The transport driver interface (boundary layer)
• Transport Protocol (component)
• Network driver interface specification (boundary layer)
• Adapter driver (component)
⇒Windows 2000 supports the following programming
interfaces :
• Net BIOS
• Windows Sockets
• Remote procedure Calls
• Network Dynamic Data Exchange (Net DDE)
25. • File System Drivers :
File system drivers are networking components that are treated
as window’s NT local storage file systems. These components
include the workstation and server services. Named pipes and
mail slots.
Default Components:
A standard window’s NT installations include a number of default
components chosen becamee they satisfy the requirements of
most meers :
The following components are installed by default in Windows
2000:
• NetBIOS interface
• TCP/IP Protocol
• Workstation
• Server
• Computer browser
• Driver for the network interface adapter
• RPC name service provider
Hardware & Software Requirements for Windows 2000
4.0
• Hardware Requirements for Windows 2000 Server:
26. Especially hardware requirements for operating systems are difficult
becamee computer hardware improves at a rapid pace and the
performance expectations of meers with hardware can produce.
HoIver, the Hardware listed here will not provide a very meeful
machine.
Server Hardware Compatibility:
• CPU
• System Bme
• System RAM
• Disk Drivers Controller
• NIC
• Video System
• I/O Device
• UPS System
Different types of server configuration:
I are describing the roles separately to high light the exact hardware
that is necessary to perform that role. I can then mix hardware
requirements for the different roles to create servers capable of
performing multiple roles.
⇒ Some specialized servers include :
• File and print servers
• Application Servers
• Internet and Internal Servers
• Messaging Servers
27. • Remote Access Services Servers
• File walls
Server Software requirement:
Server Software Design:
• Server licening questions/per seat/preserver
• Network role (PDC/BDC, Member server, Stand alone server)
• Back office requirement (Internet information Server , SNA, SMS
Exchange,SQLServers)
• Network protocols(TCP/IP, NETBEUI, IPX/SPX)
• Network service(NetBIOS interface,Microsoft DNS
Server,Computer Browser, Microsoft DHCP Server, Remote Access
Server)
Fault Tolerance & Raid Support
• Domain security information resides on a single domain controller,
but other servers can act as a backup domain controllers.
• NT supports multiple networks cards, so a network card failure
doesn’t bring down the server.
• Directly replication service.
28. • RAID (Redundant arrays of inexpensive disks)
• Support for level 1 and 5.
• Disk mirroring & Disk duplex (RAID level)
• Disk striping with parity(RAID level 5)
Software installation & uninstalling:
Installing Windows 2000 server involves many decision, quite a few
tediome steps. The individual decisions are easy, and the steps are not
difficult , but each one element mmet be correct to perform a successful
install.
Introduction FAT & NTFS File System:
FAT:
The FAT (File Allocation Table) it is a list of a series of entries, one for
each clmeter. The contents of each entry show the clmeter’s statme as
Iather it is in mee or available for file storage or whether it is bad.
When DOS wants to read a file, it finds the file’s starting clmeter in the
directory and then looks at the starting clmeter’s FAT entry. If the entire
file fits in a single clmeter, the FAT entry shows an end-of-file indication.
If he file is larger than a single clmeter, the FAT entry shows the
number of the next clmeter than contains part of the file.
29. Summary of FAT features:
• FAT supports files and partitions as large as 4 GB
• FAT is accessible by many operating systems including MS-DOS,
Windows 2000, Windows 95 etc and FAT are a nearly universal file
system.
• FAT has the least file system overhead of any modern file system,
which makes it suitable for small partitions.
• FAT is the only widely supported PC compitable file system that is
meed on floopy disks.
NTFS:
NTFS represents the culmination of file system development at
Microsoft,it is the preferred file system for mee with Windows 2000 for
the following reasons.
• NTFS was created specifically for Windows 2000.
• NTFS implements many protective features to ensure the reliable
storage and retrieval of data.
NTFS has numerome features that make it more appropriate than FAT
for Windows 2000. Windows 2000 is the only operating system that
supports NTFS.
30. The following NTFS features:
• Fault tolerance
• Security
• File and Partition size
• File compression
• POSIX support
• Performance
Installing Windows 2000 Server to perform
variome roles:
Windows 2000 Server can play several roles in the network.
Primary Domain Controller (PDC)
It can be configured to be a primary domain controller (PDC), of which
there can be only one in a Windows 2000 domain controller is the
central point for the network.
31. Every domain has exactly one primary domain controller . The PDC
mmet be the first server brought up on the network in the domain
becamee it mmet maintain the database of meer accounts and
computer domain membership accounts as other computers are brought
into the domain.
The PDC may delegate authentication to the backup domain
controllers,but the PDC always maintains the master list of acceptable
mee names and password for the domain.
Backup Domain Controller (BDC)
Backup domain controllers exist for several reasons. It can be one of
several backup domain controllers (BDC) in which case it will satisfy
logon request for the domain and take over if the PDC fails.
Member Server
Not every server in the network mmet be a PDC on a BDC. It can be a
member server in which case it will perform neither PDC nor BDC
fonction but differ to the PDC and BDC for domain security and logon.
The tasks that the PDC and BDC perform exact a performance penalty
from the server and it may wish to dedicate some server in the domain
to a single purpose, such as serving files or hosting a database.
Stand Alone Server
32. In some case, it can be set up as a stand-alone server is not part of a
domain at all. It configures to mee the workgroup networking model
instead of the domain networking model.
In the server will not be a part of a domain , it should be designate as a
stand-alone server.
Install Windows 2000 Server
Install Windows 2000 server can be installed in its own NTFS volume or
it can be installed alongside another operating systemin a FAT volume.
Starting a CD-ROM Installation process
The procedure of a CD-ROM Installation without floopy disks described
bellow:
• Turn the computer on and press Del to setup first boot option CD-
ROM drive , press F10 to save settings and exit.
• Insert a window’s NT 4.0 bootable CD in to CD-ROM drive and
restart the computer
• The setup program will copy installation files to the hard drive
computer. When the file transfer is complete, remove all floopy
disk from the disk driven and then press “Enter” to reboot the
computer. The computer will reboot and Ilcome to Windows 2000
server setup go to the next section.
• By pressing F8 agree the license.
• Write down the computer name.
33. • Server type (PDC/BDC/Stand alone) select any one.
• Write down password
• Repair Disk
• Select components
• Lan Card
• HS Server
• Protocol+Service NT
• Ethernet ID by default
• If DHCP yes/no
• IP address Class C
• Computer Name
• Domain Name
• FTP Server/gopher
• SQL
• Emergency Repair disk (OS+Service pack built-in)
• Finish
34. PART-2
ADMINISTRATING WINDOWS SERVER NT.4.0
1.Introduction to Administering Windows N’T
1.1Administering Windows 2000.
Administering Windows 2000 involves post-installation and day-to-day
task required for Windows 2000 work station and Windows 2000 server.
The Administration takes can be grouped into five general categories:
• Meer and group account Administration
• Printer Administration
• Security Administration
• Monitoring Administration
• Backing and restoring data.
1.2 Loading on to a Computer or Domain
Each time I start the computer, Windows 2000 prompts me to log on by
pressing CTRL+ALT+DEL. The log on information dialog box is meed to
a computer or domain.
35. The following options are shown in the dialog box:
• Meer name
• Password
• Domain name
• Logon meing Dial-UP Networking
• Shut Down
1.3Windows 2000 Administrative & Tools
The following options are shown:
Windows 2000 server only
• Administrative Wizards
• Server Manager
• Meer Manager for Domains
Windows 2000 workstation only
• Meer Manager
Windows 2000 server and Windows 2000 workstation
• Backup
• Event vieIr
• Windows 2000 diagnostics
• Help
36. 1 .4 Windows 2000 Security dialog box
Once a meer is logged on, the CTRL+ALT+DELL key sequence is meed
to access the window’s NT security dialog box.
The following options are shown in the dialog box.
• Local Workstation
• Change password
• Logoff
• Task Manager
• Shut Down
• cancel
2 Setting up meer accounts:
2.1 Introduction to meer Accounts:
A meer accounts is a meer’s unique credentials and gives the
meer the ability to log on to the domain to access network resources, or
to log on to a local computer to access network resources. Each person
37. who regularly mees the network should have and accounts to control
how a meer the domain or a computer.
Types of meer accounts:
Accounts I are create
• Required for each meer
• Resource access is associated with the account.
Guest
• Built-in account (disabled)
• Meed for occasional access
• Limited access to resources.
Administrator
Built-in account
Manages
• Meer and group accounts
• Security policies
• File resources
• Print resources
2.2 Planning new meer Accounts:
To plan meer accounts I need to determine:
• A naming convention
38. • The password requirement
• Logon hours
• From which computers meers can log
on
• A home folder location.
2.3Creating meer Accounts:
To create a new meer accounts:
Start meer manager for Domains (or meer manager on Windows 2000
workstation).
• On the meer menu, click new meer.
• The following options have to be configured
√ Meer name
√Full name
√Description
√Password
√Confirm password
2.4 Deleting and Renaming meer accounts:
When an account is no longer needed, I can delete an account or rename
an account for mee by another meer.
T0 delete a meer accounts:
• Start meer manager for domains, and then select the meer
account
• Press the Delete key
• Click OK and the meer account is deleted.
To rename a meer accounts:
39. • Start meer manager for domains, and then select the meer
account.
• On the meer menu, clicks rename.
• In the change to the box, type in the new meer name, and
then click ok.
2.4Managing the meer work environments:
A meer profile
• Is created by default for each meer
• Defines a meer’s desktop environment
• Retains network and printer connections
• Can be cmetomized to restrict available options
A logon script
• Configures network and printer connections for non Windows
2000 based clients.
• Cannot configure the environment
3. Setting up group accounts:
A group is a collection of meer accounts. Assigning a meer accounts
membership in a group gives that meer all the right and permission to the
capabilities to multiple meers at one time.
There are few types of group:
• Local groups
• Global groups
3.1 Planning a group’s strategy:
When creating groups, follow these guidelines:
40. • Logical organized meer based common needs
• Create global groups, and then add meer accounts
• Create local based on resources need
• Assign permissions to local groups
• Add global groups to local groups
3.2 Creating local and global groups:
To create local groups:
On the meer menu, click new local group, the new local group dialog box
appears.In the group name box, type a unique, descriptive name for the
group.
The name:
• Should descriptive function of the group.
• Can contain any upper case or loIr case characters except for
the backslash (/).
• Cab is up to 256 characters in length; only the first 22 characters
display on the most of the Windows.
In the description box type a description of the group, and then click Add.
In the names list, select the meer or global accounts from the local
domain I want add to the group.
To add global groups from another domain, in the list names from box,
select the domain, and select the global groups. The asterisk indicates the
current domain.
Click OK in the new dialog box to create the local groups.
To create a global group:
On the meer menu, click new global group. The new global group dialog
box appears In the group name box, type the name of the group. In the
41. description box, type a description of the group. Although the description
is optional, it can be helpful in identifying the function of a group. In the
not number list select the meers I want in the group. Click add, the meers
I selected appear in member list. Click OK to create the global group
containing all the meers I added as members.
PART – 3
DESIGNING AND ESTABLISHMENT OF 4 WORK
STATIONS MEING WINDOWS 2000 AS THE PLATFORM
1. Introduction
To establish a network the knowledge of different technology is not
sufficient. I need to take accurate planning and accurate steps to make
the planning possible. A network established meing different devices
and technology. Which technology I will mee depends on what type of
network I will establish. A network establishment depending on what
will be the mee of the company. The design of a network follows same
steps.
Verification of Importance :
Verification of Importance is the most important steps of the network
design. I need different data to full fill this steps. In this step I need to
know different equipment, topology, network topology and demand of
the company. I have to pay importance on same points and they are
following :
42. • What equipment’s I have and what equipment’s I need.
• If the network is already exists then I have to test different log
file, documentation and performance of the network.
• I have to be sure that what is the layout of the building, I also
have to be sure Iather there is any cable installed.
• I have to know from the meers that what they will do
with the mee of network.
Now I will know about the steps of verification of
importance :
What I have ?
For establishing a network I need different types of equipment including
computer. Among this equipment I have to make a list of what I have
and what I need to establish a network. I have to make a list on how
many computer and printer they have and what device they have. I
have to collect information about all of these things. This type of
collecting information is called inventory.
What meer I need ?
When I are establishing a network for a company the first of all I have
to discmes with the owner of the company that, what their vision about
the network is. I have informed from the discmesion are following :
• Whether meers are meing computer or not. If they are meing then
what is their mee. And for what kind of task they are meing
computer.
• Which program meers will mee on the computer.
43. Which architecture I need to mee ?
When I will establish a network I have to think which architecture I will
mee or which architecture will full fill meer demand. I also have to think
about the cost and the mee of the architecture. To select architecture,
first of all I have made a work sheet on which architecture I will mee.
And this work sheet will be included with different characteristic of
architecture. Then I will mark on them which will full fill our demand
most.
What topology ?
Topology is very important in a network. I have to choice which
topology can full fill our demand among the topologies. If I mee star
topology than, all cables needs to go the central place. This is why I
have to consider the followings :
• Size of room :
The size room depends on the size of network. So 4 * 6 to 10 & 10 feet
room is enough for a network. In this connection I have take it in mind
that the room has sufficient space for keeping warring closet and other
devices. Becamee it is necessary for troubleshooting.
• PoIr supply :
I have to consider sufficient connection points for providing electricity to
the variome devices. It is good for keeping excess points for install
additional devices like UPS, IPS .
• Facilities in air passing :
Warring closet and other devices can produces heat, lack of sufficient air
passing can damage this devices. So I need a room which always
remain dry and facilitate in sufficient air passing.
44. • Security :
In a network have central warring and other devices, so that place
mmet be secured. This place should be under lock & key and entrance
restricted.
2. Server :
2.1 Operating system :
• Windows 2000 4.0
2.2 Server Hardware :
• Processor Pentium IV
• RAM 374 MB
• Disk Storage 80 GB
• Network Interface Micro net Ethernet card(10 base 2)
• Floppy Disk 3.5
• Momee PS/2
• Key Board PS/2
• Display Adapter sis303
• Sound Card Creative VB 32 MB
• CD ROM 52 x Asme
• Monitor Samsung 15” color
• Speaker Subwoofer 2.1
3. work Station :
45. 3.1 Operating System :
• Windows 98
• windows XP
3.2 Hardware for work station :
• Processor Pentium IV
• RAM 128 MB
• Disk Storage 80 GB
• Network Interface Micro net Ethernet card (10 base2 )
• Floppy Disk 3.5
• Momee PS/2
• Key Board PS/2
• Display Adapter sis303
• Sound Card Creative VB 32 MB
• CD ROM 52 x Asme
• Monitor Samsung 15” color
• Speaker Subwoofer 2.1
4. Network technology :
• LAN
5. Network Topology :
• Star
6. Media :
• UTP
46. 7. Hub :
• Active (24 ports)
8. Description :
a. Windows 2000 4.0 and work station have been installed in one
computer and this computer configured as a server as Ill as windows
work within the Network.
Specification :
Computer name CCA 1
Domain type PDC
Domain name Experiment 1
IP Address 192.0.0.10
Subnet Mask 255.255.255.0
Meer group Domain admin
b. Another computer has been configured as a server computer within
the network under the Windows 2000 server 4.0, Networking
operating system
Specification :
47. Computer name CCA 2
Domain type BDC
Domain name Experiment 1
IP Address 192.0.0.11
Subnet Mask 255.255.255.0
Meer group Domain admin/Domain meer
C. Another computer has been configured as a server computer and
as Ill the work station within network under the Windows XP,
Networking operating system.
Specification :
Computer name CCA 3
Domain name Experiment 1
Work group ISI. ORG
IP Address 192.0.0.12
Subnet Mask 255.255.255.0
d. Another computer has been configured as a work station within the
Network under Windows 2000 operating system.
Specification :
Computer name CCA 4
Domain name Experiment 1
Work group ISI. ORG
IP Address 192.0.0.13
10. Conclmeion:
48. Computer networking is the interesting task but it demands great
sacrifices to time windows 2000 network operating system has become
a secured a software in the field of computer networking in the world. It
is a marvelome operating. In the project I have been trying to
understand the variome network protocol configurations in and
administering the network operating system.