SlideShare a Scribd company logo
1 of 104
Small Office Home Office (SOHO)
IT Network Setup
SOHO Course Outline
• Understanding Network Abbreviations
• Chapter 1: Understanding Networks
• Chapter 2: Network Components
• Chapter 3: Network Terminologies
• Chapter 4: SOHO Network Lab
• Chapter 5: SOHO Network Configurations
• Chapter 6: Email Setup Configurations
• Chapter 7: Network File share
• Chapter 8: Advanced Google search operators
Understanding Network Abbreviations
• ACK: Acknowledgement
• ACL: Access Control List
• AP: Access Point
• bps: Bits Per Second
• Bps: Bytes Per Second
• CAT-5: Category-5
• CLI: Command line interface
• DHCP: Dynamic Host Configuration Protocol
• DNS: Domain Name Service
• DSL: Digital Subscriber Line
• FTP: File Transfer Protocol
• Gbps: Gigabits per Second
• GHz: Gigahertz
• GPS: Global Positioning System
• HTML: HyperText Markup Language
• HTTP: HyperText Transfer Protocol
• HTTP-S: HyperText Transfer Protocol-Secure
• IM: Instant Messaging
• IP: Internet Protocol
• IPSec: IP Security
• IPv4: Internet Protocol version 4
• IT: Information Technology
• LAN: Local Area Network
• LOS: Line of Sight
• MAC: Media Access Control
• Mbps: Megabits Per Second
• MHz: Megahertz
• MODEM: Modulator-Demodulator
• MX: Mail Exchange
• NIC: Network Interface Card
• NMS: Network Management System
• NOC: Network Operations Center
• NTP: Network Time Protocol
• PABX: Private Automatic Branch Exchange
• PING: Packet Internet Gopher
• PK: Public Key
• PKI: Public Key Infrastructure
• POTS: Plain Old Telephone System
• PSTN: Public Switched Telephone Network
• QoS: Quality of Service
• RADIUS: Remote Authentication Dial-In User Service
• R&D: Research and Development
• RF: Radio Frequency
• RFC: Request for Change
• RFI: Request for Information
• RFP: Request for Proposal
• RFU: Ready for Use
• RTS: Real-Time Service
• SLA: Service Level Agreement
• SMS: Service Management System
• SMTP: Simple Mail Transfer Protocol
• SNMP: Simple Network Management Protocol
• SOP: Standard Operating Procedure
• SSH: Secure Socket Shell
• SSL: Secure Socket Layer
• SW: Software
• TCP: Transmission Control Protocol
• TCP/IP: Transmission Control Protocol/Internet Protocol
• TTL: Time To Live
• VoIP: Voice-over-IP
• WAN: Wide Area Network
Chapter 1:
Understanding Networks
What is a network?
• Networking is the concept of joining two
or more hosts using shared media like
hubs, switches routers, etc.
• Network is defined as the set of
computers and peripherals connected
together using a medium (wired or
wireless).
• Connection between them can be a
direct connection(i.e. through a cable) or
a indirect connection.(i.e. through a
switch/router )
• The communication between the
computers and peripherals using a
predefined set of protocols/rules .
Lets start with the word networking itself. Lets
take an example of deliberated intended
communication via a phone call.
You as a source want to call via your
mobile/home phone to a friend number to
discuss a matter, you are networking here.
Its a network of people talking to each other. so,
in computer networking basically computers
talking to each other.
Post Office network, a real world example
Client and Server:
• Client:
“A program or a terminal, which requests for
information or resources from another program
or computer called Server.”
• Server:
“A program or a computer that provides the
resources or information to the other client
terminals in the network”
ServerServerClient ComputerClient Computer
You can run Ping from a client computer to test the
connection to any host, such as a printer or a server:
The server sends an Echo Reply back to the client computer
The client computer sends an Echo Request to the server
You check the details of the Echo Reply to
determine the quality of the connection
Pinging LONDON (192.168.2.10) with 32 bytes of data:
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Ping statistics for 192.168.2.10:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = Oms, Maximum = Oms, Average = Oms
What Is Ping?
LAN vs. WAN
LAN, stands for local area network.
WAN, stands for wide area network.
Two types of networks that allow for interconnectivity
between computers.
LANs are for smaller, more localized networking, in a
home, business, school, etc.
WANs cover larger areas, such as cities, and even allow
computers in different nations to connect.
LANs are typically faster and more secure than WANs, but
WANs enable more widespread connectivity. And while
LANs tend to be owned, controlled and managed in-
house by the organization where they are deployed,
WANs typically require two or more of their constituent
LANs to be connected over the public Internet or via a
private connection established by a third-party
telecommunications provider.
LAN WAN
Stands For Local Area Network Wide Area Network
Covers Local areas only (e.g., homes,
offices, schools)
Large geographic areas (e.g.,
cities, states, nations)
Definition LAN (Local Area Network) is a
computer network covering a
small geographic area, like a
home, office, school, or group of
buildings.
WAN (Wide Area Network) is a
computer network that covers a
broad area (e.g., any network
whose communications links
cross metropolitan, regional, or
national boundaries over a long
distance).
Speed High speed (1000 mbps) Less speed (150 mbps)
Data transfer
rates
LANs have a high data transfer
rate.
WANs have a lower data transfer
rate compared to LANs.
Example The network in an office building
can be a LAN
The Internet is a good example of
a WAN
Technology Tend to use certain connectivity
technologies, primarily Ethernet
and Token Ring
WANs tend to use technologies
like MPLS, ATM, Frame Relay for
connectivity over longer distances
Connection One LAN can be connected to
other LANs over any distance via
telephone lines and radio waves.
Computers connected to a wide-
area network are often connected
through public networks, such as
the telephone system. They can
also be connected through leased
lines or satellites.
Comparison chart
Components of LAN
1.Switch
2.Cable
3.Network interface card
switch
Cable
NIC
Cables
• Fiber Optic cable
• Twisted pair cable
Twisted pair comes in two categories :
1. Cat 5e - 100 mbps
2. Cat 6 - 1000 mbps
Fiber optic cable
• Can carry large information over long
distance
• Use light signals to transfer data
Fiber-Optic
Twisted pair cable
• Uses electrical signals to transfer data
• Twisted pair cable comes in two formats:
1. UTP (Unshielded Twisted Pair)
2. STP (Shielded Twisted Pair)
• STP comes with extra copper braids to insulate
data from electrical interferences
• Used in factory floors
• UTP is used mostly in office
Twisted-Pair
Unshielded (UTP)
Shielded (STP)
Network Interface Card(NIC)
• Each NIC has an address called mac (media access
control) address burnt into the chip at the time of
manufacture
• Also called hardware address because it cannot be
changed
• Each mac address is unique in the world & in
hexadecimal format [0-9, A-F]
• E.g.
1A.2B.CC.2A.FF.3C
vendor vendor
ID defined
• Vendor ID is given to manufacture by the body in
US
• Vendor Defined portion is given to each NIC by
the manufacturer
• To see mac address
• Start Run cmd ipconfig/all
• Mac address is used by PCs to communicate on
the LAN; IP address between networks.
TCP/IP
Protocol
• Protocols are languages by which hosts communicate
on networks
• E.g. :
1. Transmission Control Protocol/Internet Protocol
2. Internetwork Packet Exchange/Sequenced
Packet Exchange (IPX/SPX)
3. NetBIOS Enhanced User Interface (NetBEUI)
4. AppleTalk
TCP/IP
TCP
• Transmission control protocol
• Helps to transfer data between hosts
• Similar to registered post/normal mail
in the case of postal mail
IP
• Internet protocol
• Used to identify a PC on the network
• Also called logical address
• Can be changed
• Similar to P.O Box, as in the case of postal mail
• Eg.192.168.1.1
• Maximum values will be 255
Class of IP
Class Range Subnet Mask NID HID
A 0 to
127.x.y.z
255.0.0.0 0 to 127.0.0.0 x.y.z
B 128 to
191.x.y.z
255.255.0.0 128 to 191.x.0.0 y.z
C 192 to
223.x.y.z
255.255.255.0 192.223.x.y.0 z
D 224 to
225.x.y.z
Not used for network
Used for research
purpose
Rules and regulations regarding IP addressing
• All host portion can’t be ‘0’, Represents the
NID
• All host portion can’t be all 255; Represents
the broadcast ID of the network
• No IP address shall start with 127, used to
troubleshoot TCP/IP
eg:127.0.0.1 is called loopback address or
myself for the PC
• Host portion should be unique
Private IP and Public IP
• The current IP we are using is IPV4
• IPV4 are of 2 Types
1. Public
2. Private
• We can have 4.2 billion IP address with it
• World population is 7 billion and we are
running out of IPs on the internet
• To conserve IP addresses, we use
concept public IP and private IP
Private IP
• Used on LAN
A: 10.0.0.1
10.255.255.254…………..1 n/w
B: 172.16.0.1
172.31.255.254…………..16 n/w
C: 192.168.0.1
192.168.255.254…………256 n/w
Public IP
• Used by ISPs on the internet
• All IPs outside the Pvt range are called public
IP
Arp (Address Resolution Protocol)
• Protocol used dynamically to convert IP
address to mac address, for PCs to
communicate on the LAN
• Operates through broadcast
• To see arp cache of a PC
>arp -a
• To delete cache manually
>arp -d
Tcp/ip port
• In addition to IP, PCs use port nos to
communicate
• Ports are channel through thro which PCs
communicate.
• A server or a PC can have more than one
application or service running on it
• To identify the service, we assign ports to it.
• Port are numbered from 1 to 65,535
• 1~1024 are well known port, reserved for TCP/IP
• For custom application we can use port numbers
between 1025 to 65,535
• E.g.
Web server : 80
FTP : 20,21
SMTP : 25
Telnet : 23
POP3 : 110
• To see ports open on a pc
>netstat
Types of communication
• Unicast - one to one
- i.e. Single PC to single PC communication
• Broadcast – One PC to all PCs on network
- Broadcast mainly precedes a unicast
- Broadcast reduces the network speed
• Multicast - One to some PCs on the network
- e.g. Videoconferencing
Types of communication
BroadcastUnicast
Multicast
What is IP Address?
• Internet Protocol Address (or IP Address) is an unique
address that computing devices use to identify itself
and communicate with other devices in the Internet
Protocol network. Any device connected to the IP
network must have an unique IP address within its
network. An IP address is analogous to a street address
or telephone number in that it is used to uniquely
identify a network device to deliver mail message.
• The traditional IP Addresses (IPv4) uses a 32-bit
number to represent an IP address. Each number can
be zero to 255. For example, 1.160.10.240 could be an
IP address.
Static Versus Dynamic IP Addresses
• An IP address can be static or dynamic.
A static IP address will never change and it is a
permanent Internet address. A dynamic IP
address is a temporary address that is
assigned each time a computer or device
accesses the Internet.
Difference between public and
private IP address
• A public IP address is an IP address that can be accessed
over the Internet. Like postal address used to deliver a
postal mail to your home, a public IP address is the globally
unique IP address assigned to a computing device. Your
public IP address can be found at What is my IP
Address page. Private IP address on the other hand is used
to assign computers within your private space without
letting them directly expose to the Internet. For example, if
you have multiple computers within your home you may
want to use private IP addresses to address each computer
within your home. In this scenario, your router get the
public IP address, and each of the computers, tablets and
smartphones connected to your router (via wired or wifi)
get a private IP address from your router
via DHCP protocol.
Chapter 2:
Network Components
SOHO Network (multiple machines
and Multi- function Printer)
Ethernet Cable
DSL/Cable
Modem
Wall Jack
Wireless Router
Cable or DSL Modem
• A cable Modem is the interface by
which you connect to the internet
via your ISP e.g. Bell, Rogers.
• Router connects to the cable
modem so your computers can all
share the same internet
connection.
• Some cable modems have built in
wireless. You might not need the
router you bought.
Router
• A device that transfers data packets along
networks.
• Located at places where two or more networks
connect.
• Assign IP addresses on the network.
• Uses protocols to communicate with each other.
• Configures the best route between any two hosts.
Switch
• Central component of a network.
• Built-in to router or can be a separate device.
• Expands the Numbers of ports needed in network
• Interconnects computers in a local network.
• Routes information from one network type to another.
Router Buying Guideline
• Faster speeds
• Increased range / Coverage area
• LAN Ports, USB ports
• More devices connected at once
• Versatile new features e.g. Parental controls,
Prioritizing devices, Port forwarding, MU-
MIMO (multi-user, multi-input/multi-output)
etc
Router Buying Guideline
Printer Buying Guideline
• Categories: Laser, Inkjet, Multifunction/All-in-one
etc
• Specifications: Resolution, Print speeds,
Connectivity, Paper handling etc
• Better to go for Laser based printers because in
long run they are cost effective. Moreover All in
one multifunction printers come up with SCAN,
Copier and FAX function as well. Which you can
use for SCAN to Email or SCAN to USB features.
Desktop/Laptop Buying Guideline
Media Connectors
• RJ –45 (Registered Jack)
– has eight (8) pins.
– How to make cables. You need
RJ 45 connectors, tester,
Punching machine and Cable roll
Cat 5/6.
– You can buy cables from Canada
computers etc.
Types of Ethernet LAN
• Ethernet - 10 mbps - Obsolete
• Fast Ethernet - 100 mbps
- Few Old devices still used
• Gigabit Ethernet - 1000 mbps
- Current speed of network
• 10 giga - 10,000 mbps
- Currently used between server and
switch; also used between switches.
- We shall be using this a couple of
years from now.
Data rate units
Name Symbol bit per second bit per second
(formula)
bit per second bps 1 1
byte per second Bps 8 8
kilobit per second Kbps 1,000 103
megabit per second Mbps 1,000,000 106
gigabit per second Gbps 1,000,000,000 109
Chapter 3:
Network Terminologies
IP addressing
• Computers/devices connected on a TCP/IP network are
identified by a special 32 bit address called IP address.
• IP address is categorized into two namely Internal and
External for the following reasons
– Effective routing of data packets in a network
– IP addresses of host machines in a network do not conflict with
anyone’s Internet address
• IP address of a computer running Windows Operating System
can be found by typing in “ipconfig” at the command
prompt.
Assigning an IP address - 1
•To verify the connection,
follow the sequence below
– Press StartControl
PanelNetwork and
Internet
connectionsNetwork
Connections.
– Right-click the Local Area
Connection (renamed here
as “Home Network”) and
select Properties from the
menu to view the Internet
protocol.
– Select Internet Protocol and
choose Properties in the
tab given below
Assigning an IP address - 2
•To assign the IP address
– Select Use the following IP address,
and then type the desired class of IP
address.
– Enter the gateway and the DNS
servers as well as given by the ISP.
– Click OK, and then click Close
– Note: To share the single internet
connection, Liza will need to install
another NIC card on her home
system.
– She can give the internal IP of the
home computer to other computers
on her network as the default
gateway to share the Internet
connection
Network services :DHCP
• The allocation is done from the
DHCP server IP database on the
local network.
• DHCP uses a client-server model
• Advantages:
– Reliable
– Client configuration
becomes easier
Dynamic Host Configuration Protocol (DHCP) is an IP
standard that helps in allocating the IP address of a client
dynamically.
DHCP (continuous)
Static IP address
IP Address does not change - good for web
servers, email servers, other local or Internet
servers and network printers etc.
Dynamic IP address
Requires DHCP server to obtain an IP address to
all your desktops, laptops, smart phone and
network devices.
Network services: DNS
• Domain Name Service (DNS) is a Internet
Directory Service that helps to map names to
IP address and vice versa.
• Email delivery is controlled by the DNS
• If the computer cannot access DNS then the
web browser will fail to find websites and
email communication will fail to take place.
• The DNS system consists of three types:
– Data ; also called resource records
– Server; also called as name server
– Internet Protocol
Deciding on a Network Architecture
• Network topology is the way in which the
network is laid out. It refers to the
configuration of cables, computers, and other
peripherals.
• Considerations while choosing a topology:
– Communication Requirement
– Financial Feasibility
– Length of cable required
– Scalability in the future
– Type of cable used
Internet access technologies
• xDSL
– It is a common term used for the many combinations of DSL or
Digital Subscriber Line technology.
– Speed ranges from 128Kb/s to 1.5Mb/s for most home users.
• Broadband Cable (Cable modem)
– It is a device connected to the cable TV network connection in a
home.
– It is broadcast-oriented.
– The bandwidth estimates range upwards of 30Mb/s
• Fibre Optic Internet
– Connection is carried by modulated light through an optic fibre.
– Down and upload speeds range from 10mgbs to 10gbps
Internet access technologies – contd..
• Wireless / 3G or 4G LTE dongles
– Provide widespread access to a large number of
subscribers in a relatively remote areas where cable
network is missing.
– Works via a satellite TV service provider or a cellular
phone network while you are on roads.
– Bandwidth can range from a few kilobits a second to
many megabits.
Chapter 4:
SOHO Network Lab
Lab: Home Network (single machine)
USB/Ethernet
Cable
DSL/Cable
Modem
Wall Jack
Lab: Home Network (multiple machines)
USB/Ethernet
Cable
DSL/Cable
Modem
Wall Jack
Router
Home Network (multiple machines)
Ethernet Cable
DSL/Cable
Modem
Wall Jack
Router
Home Wireless Network
Ethernet Cable
DSL/Cable
Modem
Wall Jack
Router
https://www.youtube.com/watch?v=EWTJKcg7Pj8
Example
Chapter 5:
SOHO Network Configurations
Wireless Security Checklist
Change the default wireless network name or SSID
Change the default password
Enable MAC address filtering
Enable encryption
How to Access the Web-Based Utility
To access the web-based utility, launch the web browser on
your computer, and enter the Router’s default IP address,
192.168.2.1, in the Address field. Then, press Enter.
A password request screen will appear. (Non-Windows XP
users will see a similar screen.) Leave the User name field
blank. The first time you open the Web-based utility, use
the default password admin. (You can set a new password
from the Administration tab’s Management screen.) Click
OK to continue.
Password Screen
WEP
• Wired Equivalent Privacy
• WEP provides security by encrypting data over
radio waves.
• Created in 1999 to secure wireless access
points.
• Major weakness uses static encryption key.
That one key is used by all users, to transmit
every packet being transmitted.
WEP
• Possible for an eves dropper to intercept
enough WEP packets to deduce the key.
• This can be mitigated by periodically changing
the WEP key.
• With good computing power hacker can
compromise the key in a few seconds.
• So WPA was developed as replacement in
2003 and with full IEEE 802.11 std as WPA 2
WPA
• Recommended encryption to be used on
wireless.
• WiFi protected Access.
• WPA uses TKIP (Temporal Integrity Protocol)
which changes key automatically.
• WPA2 is having an encryption algorithm name
CCMP build into WPA, making it more secure.
• WPA becomes vulnerable when weak
passphrases are used.
WPA
• WPA requires a bit more processing power
than WEP.
• TKIP creates a unique encryption key, using
the SSID and passphrase. This is changed
constantly.
• Another option for TKIP is AES (Advanced
Encryption Standard)
Chapter 6:
Email Setup Configurations
Free vs. Paid Email
• Perception, or how prospects and current
customers view a company and its overall
brand.
• Productivity and employees’ overall ability to
achieve day-to-day tasks, as well as long-term
projects, Guaranteed Uptime.
• Performance on both short-term and long-
term goals within an organization, 24/7
Support.
Free vs. Paid Email
• Domain name
If there’s one thing you must drop some cash on, it’s a
custom domain name for your website, complete with
an attached email address.
• Web hosting
Lock down a custom domain name, Paid Web hosting
services offer a higher quality product and better
customer support. This is especially important when it
comes to the host’s uptime.
• Email
So you’ve got your custom domain name, and the
personalized email address that comes with it.
Free vs. Paid Email
• Custom Email Address
Businesses that use the free version of email can
only send emails
as mybusinessname@Gmail.com. Notice how
your bank, insurance company and airline never
use consumer email addresses. The reason they
don’t is because it looks cheap. For US$5 a month
you can have an email
addressContact@mybusinessname.com. It looks
much more professional and is worth it for the
branding value alone.
Email Setup
Email Setup
Email Setup
Email Setup
Email Setup
Chapter 7:
Network File share
What is File sharing
• Sharing of data on a network.
• Allows multiple users to
access a particular file/folder
by enabling them to
– Read
– Modify
– Copy or,
– Print it.
• These users may have the
same or different ranks of
access privileges.
Types of File sharing
• Default share
– Does not provide security.
– Requires no configuration.
– Requires share designation.
– Default local share or Default network share.
• Restricted share
– Provides security by limiting the number of users
accessing the share at a particular time.
– Designate specific users to access the share.
– Allot permissions to control user activity on the share
(offline/online)
How to share a folder?
• Right-click the folder to be shared , and
click Properties.
• Click the Sharing tab in the folder
properties dialog box.
• Click Share this folder, and then in Share
name, type the name of the share
• In Comment, type a description for the
shared folder. This description is visible
to users who browse across the network.
• In User limit, the user can make any
changes required.
Configuring shared folder permissions
To set, view, change, or remove file and folder permissions
1. Click Start, click My Computer, and then locate the file or folder whose
permissions need to be set.
2. Right-click the file or folder, click Properties, and then click the Security tab.
3. To set permissions for a group or for a user that does not appear in the
Group or user names box, click Add, type the name of the group or of the
user that needs permissions for, and then click OK.
4. To allow or to deny a permission, select the Allow or the Deny check box in
the Permissions for User or Group box, where User or Group is the name of
the user or group.
5. To remove the group or user from the Group or user names box, click
Remove.
6. Click OK.
Chapter 7:
Advanced Google search operators
Advanced search operators
• https://www.google.com/advanced_search
• http://www.googleguide.com/advanced_oper
ators_reference.html
Advanced search operators
Example
• http://searchengineland.com/top-10-search-
modifiers-why-they-matter-what-they-are-
how-to-use-them-173343
The End

More Related Content

What's hot (20)

NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Osi model
Osi modelOsi model
Osi model
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Ccna command
Ccna commandCcna command
Ccna command
 
IPv6
IPv6IPv6
IPv6
 

Similar to SOHO Network Setup Guide

Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in detailsapel7
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxsahilraturi
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Power point presentation
Power point presentationPower point presentation
Power point presentationrajasekarsankar
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)Sam Bowne
 
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...MathivananP4
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 

Similar to SOHO Network Setup Guide (20)

Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Chapter15.pptx
Chapter15.pptxChapter15.pptx
Chapter15.pptx
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Web technology unit I - Part B
Web technology unit I - Part BWeb technology unit I - Part B
Web technology unit I - Part B
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Computing 9
Computing 9Computing 9
Computing 9
 

Recently uploaded

Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7
Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7
Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7dollysharma2066
 
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...LHelferty
 
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCRsoniya singh
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniturem3resolve
 
Delhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girl
Delhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girlDelhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girl
Delhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girlsoniya singh
 
Guwahati Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Guwahati Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesGuwahati Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Guwahati Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证0622mpom
 
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024Fikrie Omar
 
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCRsoniya singh
 
About Entrepreneur ELON MUSK .pptx...
About  Entrepreneur  ELON  MUSK .pptx...About  Entrepreneur  ELON  MUSK .pptx...
About Entrepreneur ELON MUSK .pptx...lahiruherath654
 
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Entrepreneur street first Edition is now out
Entrepreneur street first Edition is now outEntrepreneur street first Edition is now out
Entrepreneur street first Edition is now outentrepreneur street
 
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAOCATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAOTMTerraplanagem
 
Smart Traffic Management System presentation
Smart Traffic Management System presentationSmart Traffic Management System presentation
Smart Traffic Management System presentationFareeyaFaisal
 

Recently uploaded (20)

Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7
Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7
Call Girls At-( Nearby )-Bhikaji Cama Place, Delhi | ⑧③77⓿⑧76⓿7
 
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
 
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniture
 
Hot Sexy call girls in Rajouri Garden🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rajouri Garden🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rajouri Garden🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rajouri Garden🔝 9953056974 🔝 Delhi escort Service
 
Delhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girl
Delhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girlDelhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girl
Delhi Munirka 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex call girl
 
Guwahati Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Guwahati Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesGuwahati Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Guwahati Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
Why Powderless DTF Printer is T-shirt Printing Game Changer.pptx
Why Powderless DTF Printer is T-shirt Printing Game Changer.pptxWhy Powderless DTF Printer is T-shirt Printing Game Changer.pptx
Why Powderless DTF Printer is T-shirt Printing Game Changer.pptx
 
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
 
Presentation on Paytm mobile application
Presentation on Paytm mobile applicationPresentation on Paytm mobile application
Presentation on Paytm mobile application
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
 
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
 
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
 
About Entrepreneur ELON MUSK .pptx...
About  Entrepreneur  ELON  MUSK .pptx...About  Entrepreneur  ELON  MUSK .pptx...
About Entrepreneur ELON MUSK .pptx...
 
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
 
Entrepreneur street first Edition is now out
Entrepreneur street first Edition is now outEntrepreneur street first Edition is now out
Entrepreneur street first Edition is now out
 
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAOCATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
 
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
 
Smart Traffic Management System presentation
Smart Traffic Management System presentationSmart Traffic Management System presentation
Smart Traffic Management System presentation
 

SOHO Network Setup Guide

  • 1. Small Office Home Office (SOHO) IT Network Setup
  • 2. SOHO Course Outline • Understanding Network Abbreviations • Chapter 1: Understanding Networks • Chapter 2: Network Components • Chapter 3: Network Terminologies • Chapter 4: SOHO Network Lab • Chapter 5: SOHO Network Configurations • Chapter 6: Email Setup Configurations • Chapter 7: Network File share • Chapter 8: Advanced Google search operators
  • 4. • ACK: Acknowledgement • ACL: Access Control List • AP: Access Point • bps: Bits Per Second • Bps: Bytes Per Second • CAT-5: Category-5 • CLI: Command line interface • DHCP: Dynamic Host Configuration Protocol • DNS: Domain Name Service • DSL: Digital Subscriber Line • FTP: File Transfer Protocol • Gbps: Gigabits per Second • GHz: Gigahertz • GPS: Global Positioning System • HTML: HyperText Markup Language • HTTP: HyperText Transfer Protocol • HTTP-S: HyperText Transfer Protocol-Secure • IM: Instant Messaging
  • 5. • IP: Internet Protocol • IPSec: IP Security • IPv4: Internet Protocol version 4 • IT: Information Technology • LAN: Local Area Network • LOS: Line of Sight • MAC: Media Access Control • Mbps: Megabits Per Second • MHz: Megahertz • MODEM: Modulator-Demodulator • MX: Mail Exchange • NIC: Network Interface Card • NMS: Network Management System • NOC: Network Operations Center • NTP: Network Time Protocol • PABX: Private Automatic Branch Exchange • PING: Packet Internet Gopher
  • 6. • PK: Public Key • PKI: Public Key Infrastructure • POTS: Plain Old Telephone System • PSTN: Public Switched Telephone Network • QoS: Quality of Service • RADIUS: Remote Authentication Dial-In User Service • R&D: Research and Development • RF: Radio Frequency • RFC: Request for Change • RFI: Request for Information • RFP: Request for Proposal • RFU: Ready for Use • RTS: Real-Time Service • SLA: Service Level Agreement • SMS: Service Management System • SMTP: Simple Mail Transfer Protocol • SNMP: Simple Network Management Protocol • SOP: Standard Operating Procedure
  • 7. • SSH: Secure Socket Shell • SSL: Secure Socket Layer • SW: Software • TCP: Transmission Control Protocol • TCP/IP: Transmission Control Protocol/Internet Protocol • TTL: Time To Live • VoIP: Voice-over-IP • WAN: Wide Area Network
  • 9. What is a network? • Networking is the concept of joining two or more hosts using shared media like hubs, switches routers, etc. • Network is defined as the set of computers and peripherals connected together using a medium (wired or wireless). • Connection between them can be a direct connection(i.e. through a cable) or a indirect connection.(i.e. through a switch/router ) • The communication between the computers and peripherals using a predefined set of protocols/rules .
  • 10. Lets start with the word networking itself. Lets take an example of deliberated intended communication via a phone call. You as a source want to call via your mobile/home phone to a friend number to discuss a matter, you are networking here. Its a network of people talking to each other. so, in computer networking basically computers talking to each other.
  • 11. Post Office network, a real world example
  • 12. Client and Server: • Client: “A program or a terminal, which requests for information or resources from another program or computer called Server.” • Server: “A program or a computer that provides the resources or information to the other client terminals in the network”
  • 13. ServerServerClient ComputerClient Computer You can run Ping from a client computer to test the connection to any host, such as a printer or a server: The server sends an Echo Reply back to the client computer The client computer sends an Echo Request to the server You check the details of the Echo Reply to determine the quality of the connection Pinging LONDON (192.168.2.10) with 32 bytes of data: Reply from 192.168.2.10: bytes=32 time<10ms TTL=128 Reply from 192.168.2.10: bytes=32 time<10ms TTL=128 Reply from 192.168.2.10: bytes=32 time<10ms TTL=128 Reply from 192.168.2.10: bytes=32 time<10ms TTL=128 Ping statistics for 192.168.2.10: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = Oms, Maximum = Oms, Average = Oms What Is Ping?
  • 14. LAN vs. WAN LAN, stands for local area network. WAN, stands for wide area network. Two types of networks that allow for interconnectivity between computers. LANs are for smaller, more localized networking, in a home, business, school, etc. WANs cover larger areas, such as cities, and even allow computers in different nations to connect. LANs are typically faster and more secure than WANs, but WANs enable more widespread connectivity. And while LANs tend to be owned, controlled and managed in- house by the organization where they are deployed, WANs typically require two or more of their constituent LANs to be connected over the public Internet or via a private connection established by a third-party telecommunications provider.
  • 15. LAN WAN Stands For Local Area Network Wide Area Network Covers Local areas only (e.g., homes, offices, schools) Large geographic areas (e.g., cities, states, nations) Definition LAN (Local Area Network) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. WAN (Wide Area Network) is a computer network that covers a broad area (e.g., any network whose communications links cross metropolitan, regional, or national boundaries over a long distance). Speed High speed (1000 mbps) Less speed (150 mbps) Data transfer rates LANs have a high data transfer rate. WANs have a lower data transfer rate compared to LANs. Example The network in an office building can be a LAN The Internet is a good example of a WAN Technology Tend to use certain connectivity technologies, primarily Ethernet and Token Ring WANs tend to use technologies like MPLS, ATM, Frame Relay for connectivity over longer distances Connection One LAN can be connected to other LANs over any distance via telephone lines and radio waves. Computers connected to a wide- area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. Comparison chart
  • 16. Components of LAN 1.Switch 2.Cable 3.Network interface card switch Cable NIC
  • 17. Cables • Fiber Optic cable • Twisted pair cable Twisted pair comes in two categories : 1. Cat 5e - 100 mbps 2. Cat 6 - 1000 mbps
  • 18. Fiber optic cable • Can carry large information over long distance • Use light signals to transfer data Fiber-Optic
  • 19. Twisted pair cable • Uses electrical signals to transfer data • Twisted pair cable comes in two formats: 1. UTP (Unshielded Twisted Pair) 2. STP (Shielded Twisted Pair) • STP comes with extra copper braids to insulate data from electrical interferences • Used in factory floors • UTP is used mostly in office Twisted-Pair Unshielded (UTP) Shielded (STP)
  • 20. Network Interface Card(NIC) • Each NIC has an address called mac (media access control) address burnt into the chip at the time of manufacture • Also called hardware address because it cannot be changed • Each mac address is unique in the world & in hexadecimal format [0-9, A-F] • E.g. 1A.2B.CC.2A.FF.3C vendor vendor ID defined
  • 21. • Vendor ID is given to manufacture by the body in US • Vendor Defined portion is given to each NIC by the manufacturer • To see mac address • Start Run cmd ipconfig/all • Mac address is used by PCs to communicate on the LAN; IP address between networks.
  • 23. Protocol • Protocols are languages by which hosts communicate on networks • E.g. : 1. Transmission Control Protocol/Internet Protocol 2. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) 3. NetBIOS Enhanced User Interface (NetBEUI) 4. AppleTalk
  • 24. TCP/IP TCP • Transmission control protocol • Helps to transfer data between hosts • Similar to registered post/normal mail in the case of postal mail
  • 25. IP • Internet protocol • Used to identify a PC on the network • Also called logical address • Can be changed • Similar to P.O Box, as in the case of postal mail • Eg.192.168.1.1 • Maximum values will be 255
  • 26. Class of IP Class Range Subnet Mask NID HID A 0 to 127.x.y.z 255.0.0.0 0 to 127.0.0.0 x.y.z B 128 to 191.x.y.z 255.255.0.0 128 to 191.x.0.0 y.z C 192 to 223.x.y.z 255.255.255.0 192.223.x.y.0 z D 224 to 225.x.y.z Not used for network Used for research purpose
  • 27. Rules and regulations regarding IP addressing • All host portion can’t be ‘0’, Represents the NID • All host portion can’t be all 255; Represents the broadcast ID of the network • No IP address shall start with 127, used to troubleshoot TCP/IP eg:127.0.0.1 is called loopback address or myself for the PC • Host portion should be unique
  • 28. Private IP and Public IP • The current IP we are using is IPV4 • IPV4 are of 2 Types 1. Public 2. Private • We can have 4.2 billion IP address with it • World population is 7 billion and we are running out of IPs on the internet • To conserve IP addresses, we use concept public IP and private IP
  • 29. Private IP • Used on LAN A: 10.0.0.1 10.255.255.254…………..1 n/w B: 172.16.0.1 172.31.255.254…………..16 n/w C: 192.168.0.1 192.168.255.254…………256 n/w Public IP • Used by ISPs on the internet • All IPs outside the Pvt range are called public IP
  • 30. Arp (Address Resolution Protocol) • Protocol used dynamically to convert IP address to mac address, for PCs to communicate on the LAN • Operates through broadcast • To see arp cache of a PC >arp -a • To delete cache manually >arp -d
  • 31. Tcp/ip port • In addition to IP, PCs use port nos to communicate • Ports are channel through thro which PCs communicate. • A server or a PC can have more than one application or service running on it • To identify the service, we assign ports to it. • Port are numbered from 1 to 65,535 • 1~1024 are well known port, reserved for TCP/IP
  • 32. • For custom application we can use port numbers between 1025 to 65,535 • E.g. Web server : 80 FTP : 20,21 SMTP : 25 Telnet : 23 POP3 : 110 • To see ports open on a pc >netstat
  • 33. Types of communication • Unicast - one to one - i.e. Single PC to single PC communication • Broadcast – One PC to all PCs on network - Broadcast mainly precedes a unicast - Broadcast reduces the network speed • Multicast - One to some PCs on the network - e.g. Videoconferencing
  • 35. What is IP Address? • Internet Protocol Address (or IP Address) is an unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. Any device connected to the IP network must have an unique IP address within its network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify a network device to deliver mail message. • The traditional IP Addresses (IPv4) uses a 32-bit number to represent an IP address. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address.
  • 36. Static Versus Dynamic IP Addresses • An IP address can be static or dynamic. A static IP address will never change and it is a permanent Internet address. A dynamic IP address is a temporary address that is assigned each time a computer or device accesses the Internet.
  • 37. Difference between public and private IP address • A public IP address is an IP address that can be accessed over the Internet. Like postal address used to deliver a postal mail to your home, a public IP address is the globally unique IP address assigned to a computing device. Your public IP address can be found at What is my IP Address page. Private IP address on the other hand is used to assign computers within your private space without letting them directly expose to the Internet. For example, if you have multiple computers within your home you may want to use private IP addresses to address each computer within your home. In this scenario, your router get the public IP address, and each of the computers, tablets and smartphones connected to your router (via wired or wifi) get a private IP address from your router via DHCP protocol.
  • 39. SOHO Network (multiple machines and Multi- function Printer) Ethernet Cable DSL/Cable Modem Wall Jack Wireless Router
  • 40. Cable or DSL Modem • A cable Modem is the interface by which you connect to the internet via your ISP e.g. Bell, Rogers. • Router connects to the cable modem so your computers can all share the same internet connection. • Some cable modems have built in wireless. You might not need the router you bought.
  • 41. Router • A device that transfers data packets along networks. • Located at places where two or more networks connect. • Assign IP addresses on the network. • Uses protocols to communicate with each other. • Configures the best route between any two hosts.
  • 42. Switch • Central component of a network. • Built-in to router or can be a separate device. • Expands the Numbers of ports needed in network • Interconnects computers in a local network. • Routes information from one network type to another.
  • 43. Router Buying Guideline • Faster speeds • Increased range / Coverage area • LAN Ports, USB ports • More devices connected at once • Versatile new features e.g. Parental controls, Prioritizing devices, Port forwarding, MU- MIMO (multi-user, multi-input/multi-output) etc
  • 45. Printer Buying Guideline • Categories: Laser, Inkjet, Multifunction/All-in-one etc • Specifications: Resolution, Print speeds, Connectivity, Paper handling etc • Better to go for Laser based printers because in long run they are cost effective. Moreover All in one multifunction printers come up with SCAN, Copier and FAX function as well. Which you can use for SCAN to Email or SCAN to USB features.
  • 47. Media Connectors • RJ –45 (Registered Jack) – has eight (8) pins. – How to make cables. You need RJ 45 connectors, tester, Punching machine and Cable roll Cat 5/6. – You can buy cables from Canada computers etc.
  • 48. Types of Ethernet LAN • Ethernet - 10 mbps - Obsolete • Fast Ethernet - 100 mbps - Few Old devices still used • Gigabit Ethernet - 1000 mbps - Current speed of network • 10 giga - 10,000 mbps - Currently used between server and switch; also used between switches. - We shall be using this a couple of years from now.
  • 49. Data rate units Name Symbol bit per second bit per second (formula) bit per second bps 1 1 byte per second Bps 8 8 kilobit per second Kbps 1,000 103 megabit per second Mbps 1,000,000 106 gigabit per second Gbps 1,000,000,000 109
  • 51. IP addressing • Computers/devices connected on a TCP/IP network are identified by a special 32 bit address called IP address. • IP address is categorized into two namely Internal and External for the following reasons – Effective routing of data packets in a network – IP addresses of host machines in a network do not conflict with anyone’s Internet address • IP address of a computer running Windows Operating System can be found by typing in “ipconfig” at the command prompt.
  • 52. Assigning an IP address - 1 •To verify the connection, follow the sequence below – Press StartControl PanelNetwork and Internet connectionsNetwork Connections. – Right-click the Local Area Connection (renamed here as “Home Network”) and select Properties from the menu to view the Internet protocol. – Select Internet Protocol and choose Properties in the tab given below
  • 53. Assigning an IP address - 2 •To assign the IP address – Select Use the following IP address, and then type the desired class of IP address. – Enter the gateway and the DNS servers as well as given by the ISP. – Click OK, and then click Close – Note: To share the single internet connection, Liza will need to install another NIC card on her home system. – She can give the internal IP of the home computer to other computers on her network as the default gateway to share the Internet connection
  • 54. Network services :DHCP • The allocation is done from the DHCP server IP database on the local network. • DHCP uses a client-server model • Advantages: – Reliable – Client configuration becomes easier Dynamic Host Configuration Protocol (DHCP) is an IP standard that helps in allocating the IP address of a client dynamically.
  • 55. DHCP (continuous) Static IP address IP Address does not change - good for web servers, email servers, other local or Internet servers and network printers etc. Dynamic IP address Requires DHCP server to obtain an IP address to all your desktops, laptops, smart phone and network devices.
  • 56. Network services: DNS • Domain Name Service (DNS) is a Internet Directory Service that helps to map names to IP address and vice versa. • Email delivery is controlled by the DNS • If the computer cannot access DNS then the web browser will fail to find websites and email communication will fail to take place. • The DNS system consists of three types: – Data ; also called resource records – Server; also called as name server – Internet Protocol
  • 57. Deciding on a Network Architecture • Network topology is the way in which the network is laid out. It refers to the configuration of cables, computers, and other peripherals. • Considerations while choosing a topology: – Communication Requirement – Financial Feasibility – Length of cable required – Scalability in the future – Type of cable used
  • 58. Internet access technologies • xDSL – It is a common term used for the many combinations of DSL or Digital Subscriber Line technology. – Speed ranges from 128Kb/s to 1.5Mb/s for most home users. • Broadband Cable (Cable modem) – It is a device connected to the cable TV network connection in a home. – It is broadcast-oriented. – The bandwidth estimates range upwards of 30Mb/s • Fibre Optic Internet – Connection is carried by modulated light through an optic fibre. – Down and upload speeds range from 10mgbs to 10gbps
  • 59. Internet access technologies – contd.. • Wireless / 3G or 4G LTE dongles – Provide widespread access to a large number of subscribers in a relatively remote areas where cable network is missing. – Works via a satellite TV service provider or a cellular phone network while you are on roads. – Bandwidth can range from a few kilobits a second to many megabits.
  • 61. Lab: Home Network (single machine) USB/Ethernet Cable DSL/Cable Modem Wall Jack
  • 62. Lab: Home Network (multiple machines) USB/Ethernet Cable DSL/Cable Modem Wall Jack Router
  • 63. Home Network (multiple machines) Ethernet Cable DSL/Cable Modem Wall Jack Router
  • 64. Home Wireless Network Ethernet Cable DSL/Cable Modem Wall Jack Router
  • 66. Chapter 5: SOHO Network Configurations
  • 67.
  • 68. Wireless Security Checklist Change the default wireless network name or SSID Change the default password Enable MAC address filtering Enable encryption
  • 69. How to Access the Web-Based Utility To access the web-based utility, launch the web browser on your computer, and enter the Router’s default IP address, 192.168.2.1, in the Address field. Then, press Enter. A password request screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field blank. The first time you open the Web-based utility, use the default password admin. (You can set a new password from the Administration tab’s Management screen.) Click OK to continue. Password Screen
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. WEP • Wired Equivalent Privacy • WEP provides security by encrypting data over radio waves. • Created in 1999 to secure wireless access points. • Major weakness uses static encryption key. That one key is used by all users, to transmit every packet being transmitted.
  • 75. WEP • Possible for an eves dropper to intercept enough WEP packets to deduce the key. • This can be mitigated by periodically changing the WEP key. • With good computing power hacker can compromise the key in a few seconds. • So WPA was developed as replacement in 2003 and with full IEEE 802.11 std as WPA 2
  • 76. WPA • Recommended encryption to be used on wireless. • WiFi protected Access. • WPA uses TKIP (Temporal Integrity Protocol) which changes key automatically. • WPA2 is having an encryption algorithm name CCMP build into WPA, making it more secure. • WPA becomes vulnerable when weak passphrases are used.
  • 77. WPA • WPA requires a bit more processing power than WEP. • TKIP creates a unique encryption key, using the SSID and passphrase. This is changed constantly. • Another option for TKIP is AES (Advanced Encryption Standard)
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85. Chapter 6: Email Setup Configurations
  • 86. Free vs. Paid Email • Perception, or how prospects and current customers view a company and its overall brand. • Productivity and employees’ overall ability to achieve day-to-day tasks, as well as long-term projects, Guaranteed Uptime. • Performance on both short-term and long- term goals within an organization, 24/7 Support.
  • 87. Free vs. Paid Email • Domain name If there’s one thing you must drop some cash on, it’s a custom domain name for your website, complete with an attached email address. • Web hosting Lock down a custom domain name, Paid Web hosting services offer a higher quality product and better customer support. This is especially important when it comes to the host’s uptime. • Email So you’ve got your custom domain name, and the personalized email address that comes with it.
  • 88. Free vs. Paid Email • Custom Email Address Businesses that use the free version of email can only send emails as mybusinessname@Gmail.com. Notice how your bank, insurance company and airline never use consumer email addresses. The reason they don’t is because it looks cheap. For US$5 a month you can have an email addressContact@mybusinessname.com. It looks much more professional and is worth it for the branding value alone.
  • 94.
  • 96. What is File sharing • Sharing of data on a network. • Allows multiple users to access a particular file/folder by enabling them to – Read – Modify – Copy or, – Print it. • These users may have the same or different ranks of access privileges.
  • 97. Types of File sharing • Default share – Does not provide security. – Requires no configuration. – Requires share designation. – Default local share or Default network share. • Restricted share – Provides security by limiting the number of users accessing the share at a particular time. – Designate specific users to access the share. – Allot permissions to control user activity on the share (offline/online)
  • 98. How to share a folder? • Right-click the folder to be shared , and click Properties. • Click the Sharing tab in the folder properties dialog box. • Click Share this folder, and then in Share name, type the name of the share • In Comment, type a description for the shared folder. This description is visible to users who browse across the network. • In User limit, the user can make any changes required.
  • 99. Configuring shared folder permissions To set, view, change, or remove file and folder permissions 1. Click Start, click My Computer, and then locate the file or folder whose permissions need to be set. 2. Right-click the file or folder, click Properties, and then click the Security tab. 3. To set permissions for a group or for a user that does not appear in the Group or user names box, click Add, type the name of the group or of the user that needs permissions for, and then click OK. 4. To allow or to deny a permission, select the Allow or the Deny check box in the Permissions for User or Group box, where User or Group is the name of the user or group. 5. To remove the group or user from the Group or user names box, click Remove. 6. Click OK.
  • 100. Chapter 7: Advanced Google search operators
  • 101. Advanced search operators • https://www.google.com/advanced_search • http://www.googleguide.com/advanced_oper ators_reference.html

Editor's Notes

  1. LAN, WAN, IP addressing, Source IP and Destination IP.
  2. Dynamic IP real world example. What are challenges IP or changing home addresses ..
  3. Printers comparison … table or matrix format
  4. How to make RJ 45 connector and testing .. Practical example
  5. Colors fix
  6. Reset There are two ways to reset the Router’s factory defaults. Either press and hold the Reset Button for approximately five seconds, or restore the defaults from Administration &amp;gt; Factory Defaults in the Router’s web-based utility. Internet The Internet port is where you will connect your cable or DSL Internet connection. 1, 2, 3, 4 These Ethernet ports (1, 2, 3, 4) connect the Router to PCs on your wired network and other Ethernet network devices. Power The Power port is where you will connect the power adapter.