4. ⢠ACK: Acknowledgement
⢠ACL: Access Control List
⢠AP: Access Point
⢠bps: Bits Per Second
⢠Bps: Bytes Per Second
⢠CAT-5: Category-5
⢠CLI: Command line interface
⢠DHCP: Dynamic Host Configuration Protocol
⢠DNS: Domain Name Service
⢠DSL: Digital Subscriber Line
⢠FTP: File Transfer Protocol
⢠Gbps: Gigabits per Second
⢠GHz: Gigahertz
⢠GPS: Global Positioning System
⢠HTML: HyperText Markup Language
⢠HTTP: HyperText Transfer Protocol
⢠HTTP-S: HyperText Transfer Protocol-Secure
⢠IM: Instant Messaging
5. ⢠IP: Internet Protocol
⢠IPSec: IP Security
⢠IPv4: Internet Protocol version 4
⢠IT: Information Technology
⢠LAN: Local Area Network
⢠LOS: Line of Sight
⢠MAC: Media Access Control
⢠Mbps: Megabits Per Second
⢠MHz: Megahertz
⢠MODEM: Modulator-Demodulator
⢠MX: Mail Exchange
⢠NIC: Network Interface Card
⢠NMS: Network Management System
⢠NOC: Network Operations Center
⢠NTP: Network Time Protocol
⢠PABX: Private Automatic Branch Exchange
⢠PING: Packet Internet Gopher
6. ⢠PK: Public Key
⢠PKI: Public Key Infrastructure
⢠POTS: Plain Old Telephone System
⢠PSTN: Public Switched Telephone Network
⢠QoS: Quality of Service
⢠RADIUS: Remote Authentication Dial-In User Service
⢠R&D: Research and Development
⢠RF: Radio Frequency
⢠RFC: Request for Change
⢠RFI: Request for Information
⢠RFP: Request for Proposal
⢠RFU: Ready for Use
⢠RTS: Real-Time Service
⢠SLA: Service Level Agreement
⢠SMS: Service Management System
⢠SMTP: Simple Mail Transfer Protocol
⢠SNMP: Simple Network Management Protocol
⢠SOP: Standard Operating Procedure
7. â˘
â˘
â˘
â˘
â˘
â˘
â˘
â˘
SSH: Secure Socket Shell
SSL: Secure Socket Layer
SW: Software
TCP: Transmission Control Protocol
TCP/IP: Transmission Control Protocol/Internet Protocol
TTL: Time To Live
VoIP: Voice-over-IP
WAN: Wide Area Network
9. What is a network?
⢠Networking is the concept of joining two
or more hosts using shared media like
hubs, switches routers, etc.
Network is defined as the set of
computers and peripherals connected
together using a medium (wired or
wireless).
Connection between them can be a
direct connection(i.e. through a cable) or
a indirect connection.(i.e. through a
switch/router )
The communication between the
computers and peripherals using a
predefined set of protocols/rules .
â˘
â˘
â˘
10. Lets start with the word networking itself. Lets
take an example of deliberated intended
communication via a phone call.
mobile/home
You as a source want to call via your
phone to a friend number to
discuss a matter, you are networking here.
Its a network of people talking to each other. so,
in computer networking basically computers
talking to each other.
12. Client and Server:
⢠Client:
âA program or a terminal, which requests for
information or resources from another program
or computer called Server.â
⢠Server:
âA program or a computer that provides the
resources or information to the other client
terminals in the networkâ
13. Server
Client Computer
YoucanrunPingfromaclient computer totest the
connectiontoanyhost,suchasaprinteroraserver:
The client computer sends an Echo Request to the server
The server sends an Echo Reply back to the client computer
You check the details of the Echo Reply to
determine the quality of the connection
Pinging LONDON (192.168.2.10) with 32 bytes of data:
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Ping statistics for 192.168.2.10:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = Oms, Maximum = Oms, Average = Oms
What Is Ping?
14. LAN vs. WAN
LAN, stands for local area network.
WAN, stands for wide area network.
Two types of networks that allow for interconnectivity
between computers.
LANs are for smaller, more localized networking, in a
home, business, school, etc.
WANs cover larger areas, such as cities, and even allow
computers in different nations to connect.
LANs are typically faster and more secure than WANs, but
WANs enable more widespread connectivity. And while
LANs tend to be owned, controlled and managed in-
house by the organization where they are deployed,
WANs typically require two or more of their constituent
LANs to be connected over the public Internet or via a
private connection established by a third-party
telecommunications provider.
15. LAN
Stands For Local Area Network
Covers Local areas only (e.g., homes,
offices, schools)
Definition LAN (Local Area Network) is a
computer network covering a
small geographic area, like a
home, office, school, or group of
buildings.
WAN
Wide Area Network
Large geographic areas (e.g.,
cities, states, nations)
WAN (Wide Area Network) is a
computer network that covers a
broad area (e.g., any network
whose communications links
cross metropolitan, regional, or
national boundaries over a long
distance).
Speed High speed (1000 mbps)
Data transfer LANs have a high data transfer
rates rate.
Less speed (150 mbps)
WANs have a lower data transfer
rate compared to LANs.
Example The network in an office building
can be a LAN
Technology Tend to use certain connectivity
technologies, primarily Ethernet
and Token Ring
The Internet is a good example of
a WAN
WANs tend to use technologies
like MPLS, ATM, Frame Relay for
connectivity over longer distances
Connection One LAN can be connected to
other LANs over any distance via
telephone lines and radio waves.
Computers connected to a wide-
area network are often connected
through public networks, such as
the telephone system. They can
also be connected through leased
lines or satellites.
Comparison chart
17. Cables
⢠Fiber Optic cable
⢠Twisted pair cable
Twisted pair comes in two categories :
1. Cat 5e - 100 mbps
2. Cat 6 - 1000 mbps
18. Fiber optic cable
⢠Can carry large information over long
distance
⢠Use light signals to transfer data
Fiber-Optic
19. Twisted pair cable
⢠Uses electrical signals to transfer data
⢠Twisted pair cable comes in two formats:
1. UTP (Unshielded Twisted Pair)
2. STP (Shielded Twisted Pair)
⢠STP comes with extra copper braids to insulate
data from electrical interferences
⢠Used in factory floors
⢠UTP is used mostly in office
Twisted-Pair
Unshielded (UTP)
Shielded (STP)
20. Network Interface Card(NIC)
⢠Each NIC has an address called mac (media access
control) address burnt into the chip at the time of
manufacture
Also called hardware address because it cannot be
changed
Each mac address is unique in the world & in
hexadecimal format [0-9, A-F]
E.g.
1A.2B.CC.2A.FF.3C
â˘
â˘
â˘
vendor
ID
vendor
defined
21. ⢠Vendor ID is given to manufacture by the body in
US
⢠Vendor Defined portion is given to each NIC by
the manufacturer
⢠To see mac address
⢠Start Run cmd ipconfig/all
⢠Mac address is used by PCs to communicate on
the LAN; IP address between networks.
23. Protocol
⢠Protocols are languages by which hosts
on networks
E.g. :
communicate
â˘
1. Transmission Control Protocol/Internet Protocol
2. Internetwork Packet Exchange/Sequenced
Packet Exchange (IPX/SPX)
3. NetBIOS Enhanced User Interface (NetBEUI)
4. AppleTalk
24. TCP/IP
TCP
⢠Transmission control protocol
⢠Helps to transfer data between hosts
⢠Similar to registered post/normal mail
in the case of postal mail
25. IP
⢠Internet protocol
⢠Used to identify a PC on the network
⢠Also called logical address
⢠Can be changed
⢠Similar to P.O Box, as in the case of postal mail
⢠Eg.192.168.1.1
⢠Maximum values will be 255
26. Class of IP
Class Range Subnet Mask NID HID
A 0 to
127.x.y.z
255.0.0.0 0 to 127.0.0.0 x.y.z
B 128 to
191.x.y.z
255.255.0.0 128 to 191.x.0.0 y.z
C 192 to
223.x.y.z
255.255.255.0 192.223.x.y.0 z
D 224 to
225.x.y.z
Not used for network
Used for research
purpose
27. Rules and regulations regarding IP addressing
⢠All host portion canât be â0â, Represents the
NID
⢠All host portion canât be all 255; Represents
the broadcast ID of the network
⢠No IP address shall start with 127, used to
troubleshoot TCP/IP
eg:127.0.0.1 is called loopback address or
myself for the PC
⢠Host portion should be unique
28. Private IP and Public IP
⢠The current IP we are using is IPV4
⢠IPV4 are of 2 Types
1. Public
2. Private
⢠We can have 4.2 billion IP address with it
⢠World population is 7 billion and we are
running out of IPs on the internet
⢠To conserve IP addresses, we use
concept public IP and private IP
29. Private IP
â˘Used on LAN
A: 10.0.0.1
10.255.255.254âŚâŚâŚâŚ..1 n/w
B: 172.16.0.1
172.31.255.254âŚâŚâŚâŚ..16 n/w
C: 192.168.0.1
192.168.255.254âŚâŚâŚâŚ256 n/w
Public IP
⢠Used by ISPs on the internet
⢠All IPs outside the Pvt range are called public
IP
30. Arp (Address Resolution Protocol)
⢠Protocol used dynamically to convert IP
address to mac address, for PCs to
communicate on the LAN
⢠Operates through broadcast
⢠To see arp cache of a PC
>arp -a
⢠To delete cache manually
>arp -d
31. Tcp/ip port
⢠In addition to IP, PCs use port nos to
communicate
⢠Ports are channel through thro which PCs
communicate.
⢠A server or a PC can have more than one
application or service running on it
⢠To identify the service, we assign ports to it.
⢠Port are numbered from 1 to 65,535
⢠1~1024 are well known port, reserved for TCP/IP
32. ⢠For custom application we can use port numbers
between 1025 to 65,535
E.g.
â˘
Web server : 80
FTP : 20,21
SMTP : 25
Telnet : 23
POP3 : 110
⢠To see ports open on a pc
>netstat
33. Types of communication
⢠Unicast - one to one
- i.e. Single PC to single PC communication
⢠Broadcast â One PC to all PCs on network
- Broadcast mainly precedes a unicast
- Broadcast reduces the network speed
⢠Multicast - One to some PCs on the network
- e.g. Videoconferencing
35. What is IP Address?
⢠Internet Protocol Address (or IP Address) is an unique
address that computing devices use to identify itself
and communicate with other devices in the Internet
Protocol network. Any device connected to the IP
network must have an unique IP address within its
network. An IP address is analogous to a street address
or telephone number in that it is used to uniquely
identify a network device to deliver mail message.
The traditional IP Addresses (IPv4) uses a 32-bit
number to represent an IP address. Each number can
be zero to 255. For example, 1.160.10.240 could be an
IP address.
â˘
36. Static Versus Dynamic IP Addresses
⢠An IP address can be static or dynamic.
A static IP address will never change and it is a
permanent Internet address. A dynamic IP
address is a temporary address that is
assigned each time a computer or device
accesses the Internet.
37. Difference between public and
private IP address
⢠A public IP address is an IP address that can be accessed
over the Internet. Like postal address used to deliver a
postal mail to your home, a public IP address is the globally
unique IP address assigned to a computing device. Your
public IP address can be found at What is my IP
Address page. Private IP address on the other hand is used
to assign computers within your private space without
letting them directly expose to the Internet. For example, if
you have multiple computers within your home you may
want to use private IP addresses to address each computer
within your home. In this scenario, your router get the
public IP address, and each of the computers, tablets and
smartphones connected to your router (via wired or wifi)
get a private IP address from your router
via DHCP protocol.
39. SOHO Network (multiple machines
and Multi- function Printer)
Ethernet Cable
DSL/Cable
Modem
Wall Jack
Wireless Router
40. Cable or DSL Modem
⢠A cable Modem is the interface by
which you connect to the internet
via your ISP e.g. Bell, Rogers.
⢠Router connects to the cable
modem so your computers can all
share the same internet
connection.
⢠Some cable modems have built in
wireless. You might not need the
router you bought.
41. Router
⢠A device that transfers data packets along
networks.
⢠Located at places where two or more networks
connect.
⢠Assign IP addresses on the network.
⢠Uses protocols to communicate with each other.
⢠Configures the best route between any two hosts.
42. Switch
â˘
â˘
â˘
â˘
â˘
Central component of a network.
Built-in to router or can be a separate device.
Expands the Numbers of ports needed in network
Interconnects computers in a local network.
Routes information from one network type to another.
43. Router Buying Guideline
⢠Faster speeds
⢠Increased range / Coverage area
⢠LAN Ports, USB ports
⢠More devices connected at once
⢠Versatile new features e.g. Parental controls,
Prioritizing devices, Port forwarding, MU-
MIMO (multi-user, multi-input/multi-output)
etc
45. Printer Buying Guideline
⢠Categories: Laser, Inkjet, Multifunction/All-in-one
etc
⢠Specifications: Resolution, Print speeds,
Connectivity, Paper handling etc
⢠Better to go for Laser based printers because in
long run they are cost effective. Moreover All in
one multifunction printers come up with SCAN,
Copier and FAX function as well. Which you can
use for SCAN to Email or SCAN to USB features.
47. Media Connectors
⢠RJ â45 (Registered Jack)
â has eight (8) pins.
â Howto make cables. You need
RJ 45 connectors, tester,
Punching machine and Cable roll
Cat 5/6.
â You can buy cables from Canada
computers etc.
48. Types of Ethernet LAN
⢠Ethernet - 10 mbps - Obsolete
⢠Fast Ethernet - 100 mbps
- Few Old devices still used
⢠Gigabit Ethernet - 1000 mbps
- Current speed of network
⢠10 giga - 10,000 mbps
- Currently used between server and
switch; also used between switches.
- We shall be using this a couple of
years from now.
49. Data rate units
Name Symbol bit per second bit per second
(formula)
bit per second bps 1 1
byte per second Bps 8 8
kilobit per second Kbps 1,000 103
megabit per second Mbps 1,000,000 106
gigabit per second Gbps 1,000,000,000 109
51. IP addressing
⢠Computers/devices connected on a TCP/IP network are
identified by a special 32 bit address called IP address.
IP address is categorized into two namely Internal and
External for the following reasons
â Effective routing of data packets in a network
â IP addresses of host machines in a network do not conflict with
anyoneâs Internet address
IP address of a computer running Windows Operating System
can be found by typing in âipconfigâ at the command
prompt.
â˘
â˘
52. Assigning an IP address - 1
â˘To verify the connection,
follow the sequence below
â Press Startď Control
Panelď Network and
Internet
connectionsď Network
Connections.
â Right-click the Local Area
Connection (renamed here
as âHome Networkâ) and
select Properties from the
menu to view the Internet
protocol.
â Select Internet Protocol and
choose Properties in the
tab given below
53. Assigning an IP address - 2
â˘To assign the IP address
â Select Use the following IP address,
and then type the desired class of IP
address.
â Enter the gateway and the DNS
servers as well as given by the ISP.
â Click OK, and then click Close
â Note: To share the single internet
connection, Liza will need to install
another NIC card on her home
system.
â She can give the internal IP of the
home computer to other computers
on her network as the default
gateway to share the Internet
connection
54. Network services :DHCP
â˘
â˘
⢠The allocation is done from the
DHCP server IP database on the
local network.
DHCP uses a client-server model
Advantages:
â Reliable
â Client configuration
becomes easier
ď¤Dynamic Host Configuration Protocol (DHCP) is an IP
standard that helps in allocating the IP address of a client
dynamically.
55. DHCP (continuous)
Static IP address
IP Address does not change - good for web
servers, email servers, other local or Internet
servers and network printers etc.
Dynamic IP address
Requires DHCP server to obtain an IP address to
all your desktops, laptops, smart phone and
network devices.
56. Network services: DNS
⢠Domain Name Service (DNS) is a Internet
Directory Service that helps to map names to
IP address and vice versa.
⢠Email delivery is controlled by the DNS
⢠If the computer cannot access DNS then the
web browser will fail to find websites and
email communication will fail to take place.
⢠The DNS system consists of three types:
â Data ; also called resource records
â Server; also called as name server
â Internet Protocol
57. Deciding on a Network Architecture
⢠Network topology is the way in which the
network is laid out. It refers to the
configuration of cables, computers, and other
peripherals.
Considerations while choosing a topology:
â˘
â
â
â
â
â
Communication Requirement
Financial Feasibility
Length of cable required
Scalability in the future
Type of cable used
58. Internet access technologies
⢠xDSL
â It is a common term used for the many combinations of DSL or
Digital Subscriber Line technology.
â Speed ranges from 128Kb/s to 1.5Mb/s for most home users.
Broadband Cable (Cable modem)
â It is a device connected to the cable TV network connection in a
home.
â It is broadcast-oriented.
â The bandwidth estimates range upwards of 30Mb/s
Fibre Optic Internet
â Connection is carried by modulated light through an optic fibre.
â Down and upload speeds range from 10mgbs to 10gbps
â˘
â˘
59. Internet access technologies â contd..
⢠Wireless / 3G or 4G LTE dongles
â Provide widespread access to a large number of
subscribers in a relatively remote areas where cable
network is missing.
â Works via a satellite TV service provider or a cellular
phone network while you are on roads.
â Bandwidth can range from a few kilobits a second to
many megabits.
68. Wireless Security Checklist
Change the default wireless network name or SSID
Change the default password
Enable MAC address filtering
Enable encryption
69. How to Access the Web-Based Utility
To access the web-based utility, launch the web browser on
your computer, and enter the Routerâs default IP address,
192.168.2.1, in the Address field. Then, press Enter.
A password request screen will appear. (Non-Windows XP
users will see a similar screen.) Leave the User name field
blank. The first time you open the Web-based utility, use
the default password admin. (You can set a new password
from the Administration tabâs Management screen.) Click
OK to continue.
Password Screen
70.
71.
72.
73.
74. WEP
⢠Wired Equivalent Privacy
⢠WEP provides security by encrypting data over
radio waves.
⢠Created in 1999 to secure wireless access
points.
⢠Major weakness uses static encryption key.
That one key is used by all users, to transmit
every packet being transmitted.
75. WEP
⢠Possible for an eves dropper to intercept
enough WEP packets to deduce the key.
⢠This can be mitigated by periodically changing
the WEP key.
⢠With good computing power hacker can
compromise the key in a few seconds.
⢠So WPA was developed as replacement in
2003 and with full IEEE 802.11 std as WPA 2
76. WPA
⢠Recommended encryption to be used on
wireless.
⢠WiFi protected Access.
⢠WPA uses TKIP (Temporal Integrity Protocol)
which changes key automatically.
⢠WPA2 is having an encryption algorithm name
CCMP build into WPA, making it more secure.
⢠WPA becomes vulnerable when weak
passphrases are used.
77. WPA
⢠WPA requires a bit more processing power
than WEP.
⢠TKIP creates a unique encryption key, using
the SSID and passphrase. This is changed
constantly.
⢠Another option for TKIP is AES (Advanced
Encryption Standard)
86. Free vs. Paid Email
⢠Perception, or how prospects and current
customers view a company and its overall
brand.
⢠Productivity and employeesâ overall ability to
achieve day-to-day tasks, as well as long-term
projects, Guaranteed Uptime.
⢠Performance on both short-term and long-
term goals within an organization, 24/7
Support.
87. Free vs. Paid Email
⢠Domain name
If thereâs one thing you must drop some cash on, itâs a
custom domain name for your website, complete with
an attached email address.
⢠Web hosting
Lock down a custom domain name, Paid Web hosting
services offer a higher quality product and better
customer support. This is especially important when it
comes to the hostâs uptime.
⢠Email
So youâve got your custom domain name, and the
personalized email address that comes with it.
88. Free vs. Paid Email
⢠Custom Email Address
Businesses that use the free version of email can
only send emails
as mybusinessname@Gmail.com. Notice how
your bank, insurance company and airline never
use consumer email addresses. The reason they
donât is because it looks cheap. For US$5 a month
you can have an email
addressContact@mybusinessname.com. It looks
much more professional and is worth it for the
branding value alone.
96. What is File sharing
⢠Sharing of data on a network.
⢠Allows multiple users to
access a particular file/folder
by enabling them to
â Read
â Modify
â Copy or,
â Print it.
⢠These users may have the
same or different ranks of
access privileges.
97. Types of File sharing
⢠Default share
â Does not provide security.
â Requires no configuration.
â Requires share designation.
â Default local share or Default network share.
⢠Restricted share
â Provides security by limiting the number of users
accessing the share at a particular time.
â Designate specific users to access the share.
â Allot permissions to control user activity on the share
(offline/online)
98. How to share a folder?
â˘
â˘
â˘
â˘
â˘
Right-click the folder to be shared , and
click Properties.
Click the Sharing tab in the folder
properties dialog box.
Click Share this folder, and then in Share
name, type the name of the share
In Comment, type a description for the
shared folder. This description is visible
to users who browse across the network.
In User limit, the user can make any
changes required.
99. Configuring shared folder permissions
To set, view, change, or remove file and folder permissions
1. Click Start, click My Computer, and then locate the file or folder whose
permissions need to be set.
2. Right-click the file or folder, click Properties, and then click the Security tab.
3. To set permissions for a group or for a user that does not appear in the
Group or user names box, click Add, type the name of the group or of the
user that needs permissions for, and then click OK.
4. To allow or to deny a permission, select the Allow or the Deny check box in
the Permissions for User or Group box, where User or Group is the name of
the user or group.
5. To remove the group or user from the Group or user names box, click
Remove.
6. Click OK.