You are on page 1of 75

Networking

Connecting of two or more then two computers or


computer devices with each other in order to share
software's , data and Resources is called Network

Data: = files and folders


Resource: = printers –cd rom etc.
Benefits of Network
1- sharing of software's

2-sharing of hardware’s

3- sharing of data

4- sharing resources

5- To Save Time

6- To save Money
Devices for Making Network
1- computer

2- cable

3- Rj45

4- Switch

5- Router

6-ip

7- Access Point

8- Persons
Kinds of network

Physical network Logical network

workgroup Domain

LAN MAN WAN


Peer to peer Client
Types of Network
• 1: LAN 2: MAN 3: WAN 4: SAN 5:PAN
• 1: LAN: - (Local Area Network)
• Network in a small geographic area is called LAN
• OR network within a building or two near buildings.
• It’s cheap, secure and fast .
2:- MAN: - (Metropolitan Area Network)

 Is a network which exists in a medium geographic area.


 like network in a small cities, towns or branch offices
 Less secure, less fast and expensive than LAN.
3: WAN: - (Wide Area Network)
 It exists in a wide geographic area.
 OR network between cities, countries is called WAN
 Internet is a good example of WAN
 less fast and more expensive.
LOGICAL NETWORK It exists logically

Types of Logical Network


1: Work Group 2: Domain

 1: Work Group
 It’s a simple network in which All computers has its own rights .
 No control from other computers. workgroup name must be same for better
communication.
 PC name and IP address will be different.
 2: Domain
 In a domain network security boundaries are defined for computers, users, Groups and
other objects.
TOPOLOGY

 The Physical shape and design of network is called topology


 Types of Topology
 1: Bus Topology.
 2: Ring Topology.
 3: Star Topology.
 4: Mesh Topology.
 5. Hierarchical topology.
 6. Extended star Topology.
Bus Topology
In this topology all network devices are
connected to central line
If this line breaks all network will go down
Speed is slow
Ring Topology
In this topology all network devises are
connected in circular shape
Speed is faster than Bus Topology. If a single line
breaks all network will go down.
Star Topology
In this topology all network devices are connected to a
central point called Hub or Switch
Speed is fast, now it’s used the most, it’s secure
Mesh Topology
All network devices are connected to each other with a
separate line
Expensive but Reliable
Now it’s used in WAN .
Extended star topology
 The collection of star topology is called extend star topology.
Hieratical topology
 Hierarchical topology – system is linked to a computer that
controls the traffic on the topology.
 => mobile company use more this topology.
 NETWORK DEVICES

 Any device that has a network interface in order to communicate to another device is
called network device
 Bluetooth can be a network device

 1: LAN Card or NIC 2: HUB 3: SWITHCH 4: ROUTER


LAN CARD OR NIC

 (Local Area Network Card or Network Interface Card)


 It connects our computer to media or cables
 It has wireless and wired
 It has physical address which is unique MAC(Media Access control) address
 We assign IP address to it .
HUB
=> Hub is a central point for our network.
 It’s called not intelligent, device because it doesn’t know MAC (Media Access Control)
 It does broadcast = send to all
 Speed is slower than Switch and not secure
SWITCH

 Switch is a central point too.


 Intelligent device because it knows MAC address
 Speed is fast and secure, it do unicast and multicast also broadcast.
 Unicast = send to one
 Multicast = send to many
 Broadcast = send to all
 Switch has many types of ports like.
 Ethernet = 10 Mbps
 Fast Ethernet = 100 Mbps
 Gigabit = 1000 Mbps
 Fiber
ROUTER
 It connects different networks with each other
 Like, LAN with WAN or LAN’s
 And router find best path to reach destination.
 Wireless Access Point
 It connects our mobile devices to our network.
 like laptops, Mobiles, and desktops which has wireless NIC Card.
 Wi-Fi stands for (Wireless Fidelity)
 which is compatible with 802.11b,g and n standard.
Connecting Devices

Connecting devices
Internet working devices

Networking devices Gateways Router


1. Change the format of data. Resolution change. 8,16,24 ports, it
repeat the signal,
Repeater 2. Not change format more ports then repeater intelligent device
know the mac address.
3. Connect two or more networks wireless also has, it use in the hub
switch time use between hubs
4. Not intelligent device. Before switch it used 8,16,24,32 ports has.
bridges Does not know the mac address it broadcast to all.
5. It is a device which is used for internet LAN with LAN and LAN
with man. Power full intelligent.
HUB 6. It is border between two networks, between ISP and company.
MEDIA
Something that carries a message from one place to another
is called media.

 Types of Network Media

 1: Unbounded (Wireless Media) 2: Bounded (Wired Media)


Unbounded (Wireless Media) :

 it is exists in air, it’s not secure . Wireless media


can moves through obstacles. (problem)
 Bluetooth Radio Frequency Satellite Waves Micro Waves
Three types of cabling

 1. Twisted-Pair or Copper Cable.


 2. Coaxial Cable 200/500 meters. Or copper cable
 3. Fiber- optic cable.
2nd: Bounded (Wired Media)

 data is moved in wires, its secure


 Types of wired media
Copper media

Twisted Paired Cable Coaxial Cable

UTP (Unshielded Twisted Paired) STP (Shielded Twisted Paired)


Twisted paired Cable (TPC)

 This cable has four pairs and eight wires in different colors
 Types TPC (Twisted Paired Cable)

 STP (Shielded Twisted Paired)


 UTP (Unshielded Twisted Paired)
STP (Shielded Twisted Paired)
 It has extra shield against (EMI) Electric Magnetic Interface
 UTP (Unshielded Twisted Paired) cable
 No extra shield on it
Categories of TPC (Twisted Paired Cable)

 1. category. = voice only phone.


 2. category. = data to 4mbps.
 3. category
 4. category
 Cat 5: this cable works up to 100 meters, speed is 100 Mbps
 Cat 5e: this cable works up to 100 meters, speed is 1000 Mbps
 Cat 6: this cable works up to 200 meters, speed is 1000 Mbps
 Cat 7: , transmits data at a rate of up to 10000Mbps.
Coaxial Cable

 This cable was used for network


 Now replaced by TPC used for TV etc. work up to 180 meters 10 Mbps.
Cabling Standard

 For TPC we use RJ45 connector (Register Jack45)


 For telephone line we use RJ11
CRIMPING TOOL

 It Is used for connecting RJ 45 and RJ 11 ,RJ4 Connectors with cable


CABILING STANDARD (Wiring)

 1: Straight Cable 2: Cross Cable 3: Rollover Cable


 Straight Cable is used for connecting different devices
 Like: Hub with Switch / computer with Switch etc.
 Note: in new technology
 it can also be used for same devices
 Like: computer with computer / Switch with Switch
 Straight Cable
Cross Cable
 It is used for connecting same devices to each other
 Like: Hub With Hub / Computer with Computer etc.
 Cross Cable Formula B Cross Cable Formula A
Note: in cabling just 4 wires are used for data which are 1,2,3,6 and wires of 4,5,7,8 are used for protection.
ROLLOVER CABLE (CONSOL CABLE)
 Is used for configuring Routers and Switches
 one side of this cable is like standard A and other side is opposite of side A.
 mean start the side B: brown ,white brown, green, white blue, blue, white green, orange, white
orange.
Fiber Optic Cable

 This cable is made of glass and data is moved through light pulses.
 This cable is fast and expensive.
 Installation of this cable need skill, used in long distance
MEDIA CONVERTER

 This device convert data of one media to another


IP (Internet Protocol)

 A protocol is set of rules and procedures used for communication.


 A computer on a network must agree upon a common protocol in order to
communicate
 Example: IP (Internet Protocol)
 TCP /IP ( Transmission Control Protocol / Internet Protocol)
 It’s a bunch of protocol
BINARY
 Binary is computer language
 Binary has two digits 0 and 1
 0 = off counted as 0: example 00000000=0
 1 = on counted as its own value where it’s placed
 Or 1byte = 8 bits
 Each byte can take value from 0 to 255.
 From 0 to 9 is decimal
 128 64 32 16 8 4 2 1
 0 0 0 0 0 0 0 0 =1 byte
 Decimal = 8
 Binary = 00001000= 8 18 = 00010010 128= 10000000
 Examples:
 31= 00011111 00011111= 1byte 35 =00100011 128= 10000000
 141= 10001101
 202= 11001010
 254= 11111110
 230= 11100110
 180= 10110100
 11111111= 255
IP ADDRESS (Internet Protocol)
 Versions of IP address
 1st: version 4
 2nd: version 6
 IP address internet protocol version 4
 It’s a numeric identifier in a network each network device must has an IP address in order to
communicate.
 It is 4 Byte 32 bit
 Each byte take value from 0 to 255.
 Example: 192.0.255.1 10.0.1.1
 10.0.1.255 10.0.0.2
 10.255.0.200
CLASSES OF ADDRESSES

 In IP address we have 5 classes in which 3 of them are used A, B and C are used
in common
 Network class D and E are used for their purpose.
IANA (internet Assigned Numbers Authority)

 It Is a company which has made IP address and also this company has classified IP

address.

 This company is located in USA and also this company has sold the IP address to all the

people
CLASS A

 Its first byte from left must be between 1 to 127

 Subnet Mask by default in class A is 255.0.0.0

 EX: 10.206.0.1 120.0.2.1 115.25.0.1 29.0.30.140 , 15.20.200.1, 111.4.150.1


CLASS B

 Its first byte from left must be between 128 to 191


 Ex: 140.0.255.1 , 150.255.1.2, 172.16.0.1 , 180.20.15.180 ,191.0.250.1.
130.0.1.8
 subnet mask: 255.255.0.0
CLASS C

 Its first byte from left must be between 192 to 223.


 Ex: 192.168.0.1 Ex: 203.200.1.3 ,223.50.220.1 198.150.220.1
 Subnet Mask: 255.255.255.0
CLASS D and E

 It’s used and reserved for troubleshooting


 Class D: from 224 to 239
 Class E: from 240 to 255
 Ex: 241.250.0.1
 NOTE:
 In class A 127 from left could not be assigned, it’s called loopback address used for
checking of network card (NIC)
 Ex: 127.0.0.1
 169.254.0.0 To 169.254.255.254 this address is reserved
for apipa (automatic privet IP address)
 How to check status of LAN CARD? Run-cmd-ping
127.0.0.1
 SUBNET MASK
 Subnet Mask shows network portion and host portion in an IP address.
 Network Portion: this portion is portion where computers sets, network portion must be
same in all PC’s in the same network. 255 in subnet mask shows network portion.
 Example: 172.16.0.1
 Subnet Mask: 255.255.0.0
 Note: 255 shows network portion because in subnet mask is equal to 1 or on in binary
Network portion must be same
 172.16.0.0
 255.255.0.0
 Network Network Host Host

172.16.1.2

Because same IP

 172.16.0.1
 172.16.0.2 172.17.0.3 172.16.0. 2
 HOST PORTION
 It must be different in all PC’s in our same network and in subnet mask in binary host portion is equal
 To zero 0 or off

BINARY:
NETWORK ID

 When in an IP all host bits are equal to zero 0 or off is not assigned to computer
 Example: 192.168.1.0 10.0.0.0 Ex: 10.0.0.0
 Subnet Mask: 255.255.255.0 255.0.0.0
 1st IP: 192.168.1.1 up to 255 for each network 150.168.0.0 0.1 150.168.255.255
BROADCAST IP

 When all host bits are on or 1, it could not be assigned to PC’s


 10. 0 . 0 .0 = network ID
 255.0.0. 0 10.0.0. 1st IP
 10.255.255.255 last IP or broadcast IP
 10.255.255.254 = last valid IP
 172.16.0.0 172.16.255.255 , 192.168.10.0 br: 192.168.10.255 192.168.10.254
 129.10.0.0 , 129.10.0.1 , 129.10.255.255 ,129.10.255.254.
 10.0.0.1
 10.0.0.2
 10.0.0.255 up to
 10.255.255.255 Broadcast IP
CLASS A

 CLASS A 10.0.0.0 = Network ID


 10.0.0.0 0 off
 255.0.0.0 10.0.0.1 = First IP

 N H 10.0.0.240= 240TH IP
 10.255.255.255 = Broadcast IP
 11.0.0.0 = another Network
 CLASS B 172.16.0.0 = network ID
 172.16.0.0 255.255.0.0 = SUBNET Mask
 255.255.0.0 172.16.0.1 = first IP
 N H 172.17.0.0 = another ID
 172.17.0.1 = 1st IP

172.17.255.255 = Broadcast
 172.17.255.254 = Last Valid IP
 CLASS C 192.168.1.0 = Network ID
 255.255.255.0 = Subnet Mask
 192.168.1.0 192.168.1.1 = First IP
 255.255.255.0 192.168.1.255 = Broadcast
 N H 192.168.1.254 = Last Valid IP
 192.168.2.0 = Another Network
PRIVATE and PUBLIC IP’s

 Private IP Addresses are free of cost, they could be used


in many places at once
 In internet many private IP’s are changed to public IP’s .
 RANGES
 Class A:
 10.0.0.0 to 10.255.255.255 Free of cost
 11.0.0.0 Not free of cost must be paid
 Class B:
 172.16.0.0 to 172.31.255.255
 15 networks are free of cost from 16 to 31
 Class C:
 192.168.0.0 to 192.168.255.0
 255 networks are free of cost
  
 Public IP Addresses
 these IP’s are not free we must buy it from ISP (Internet Service Provider)
 Mostly they are assigned to webserver, FTP server (File Transfer Protocol)
PRACTICAL DAY

 Assigning an IP Address to a line card


 By three ways we can assign IP address to a PC
 Manually = on each PC we assign an IP manually
 Automatically = each computer will take an IP from DHCP server
 APIPA (Automatic Private IP Address)
 If DHCP server is not available then it will take it from APIPA
STEPS
Control panel > network and sharing center > change adaptor settings
We just can assign IP to adaptor like wired and wireless LAN cards

 Right click on local area connection > properties > internet protocol version 4 (TCP/IPv4)
 Properties use the following IP address
 IP address automatically
 Use the following IP address
IP address automatically = DHCP
Use the following IP address = MANUALLY
Note: right click on Local Area Connection > status >
Properties > detail = it shows network connection detail
COMMANDS FOR IP
 IP Config = shows less information about our PC
 IP Config /all = shows more information about our computers
 Run >CMD > ipconfig> enter
 Run > CMD > ipconfig/all > enter
Communication
 To check communication we use ping command
 Ex: run > cmd > ping 192.168.1.2 or name of another computer
 Like ping PC1 (ping Google .com)
 Request = mean no communication
 Reply from IP that we pinged mean communication OK
 Destination host unreachable = no communication
 or request time out = no communication or general failure
 Ping 192.168.1.4 –t = it continually send ping request
 To stop ctrl + c
 Ping 192.168.1.4 –n 20 = ping 20 times
 Computer Name
 we can also communicate on computers names. but we must have an IP address.
Virtualization

 In MCITP for virtualization we will use different software VMware and hyper – V hyper.
 VMware (virtual machine)
 To run more virtual machine at a time in one computer. for networking and other purposes we use
VMware.
 Versions
 Version 7
 Version 9
 Requirements
 For MCITP minimum 3 GB ram.
 30 GB free space for more than one operating system
 Processor minimum core 2 duo 2.3 if it support 64 bit preferred for R2 server 2008.
SHARING and network access

 Through sharing we can share files and accesses it through network accesses in another PC
 Member of administrators and power users can share a folder.
 permission
 Read = open copy
 Change = edit, delete, write data
 Full control = full control even can change permission.
 Advanced sharing
 in another computer how to access it
 \\192.168.10.41 or \\noor-pc
Hidden Share

 Through hidden share if we share a folder the users who know its share
name can access it .because it’s hidden. We use dollar $ sign with share
name. ali$
 To access \\ip\sharename$
 Example: \\10.0.0.1\myfolder$
 Note: all drives are shared as hidden share for administrator purpose
MAP NETWORK DRIVE

 Through map network drive we can show folder from another PC as a drive.
 How to manage share folder?
REMOTE DESKTOP CONNECTION

 Through remote desktop connection we can access


desktop of another computer.
 Just member of administrator and remote desktop users
can login to that computer.
 To login to another computer
 Run > MSTSC > IP or computer name of another
computer
Remote Assistant

 Through remote assistant we invite someone to access our desktop with and without control.

 the person must access the invitation through email or shared folder.

 Computer A want to invite computer B to access its desktop.

 A.in computer A make an invitation and put it in a shared folder.

 B. access shared folder and open invitation and give password which is located in computer A.
Server manager

 from server manager we can perform different task or see some information.

 from here we can add ,remove role feature etc.


Role

 In windows server 2008 we have roles. which perform major tasks. in some role there is role
service. dns, active directory domain services ,hyper-v,web server, Files server, DFS role service,
quota management, file screening role service.
 role service

You might also like