0% found this document useful (0 votes)
11 views

Untitled Document

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Untitled Document

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

day -- 2

Computers are basically connected through topology.


Topology is the arrangement that is used to connect computer and network devices.
types of topology are BUS, RING, STAR, MESH,TREE,HYBRID.
This is done in 2 ways. The first MAC (Media Access Control) address,
also known as the hardware or physical address, is given to a NIC (Network Interface Card)
by the manufacturer. It is a 48-bit address notation given to card in the
format XX:XX:XX:XX:XX:XX, where X can be any digit between 0-9, A-F.

how the devices are identified in a network.

Second, with the use of IP (Internet Protocol) address or logical address.


It has version 4 and version 6. This is given by a user/network admin,
in the 32-bit binary format (IPv4), typically represented in decimal format A.A.A.A
where A can be any decimal number between 0-255. In IPv6 has an address space of 128 bits,
represented in 8 blocks of XXXX separated by a colon (:), where each X (hexadecimal digit)
corresponds to its binary representation.

these all have a fixed byte size of 32 and the network id and host varies for various classes,
Network ID: The network ID is a portion of an IP address that is used to designate a
specific network or host.
Host ID: The host ID is another portion of an IP address used to identify a specific IP/TCP
network.

Class A – starting with number 1 to 126, for e.g., 10.10.10.10, 125.15.145.254


The Fixed Subnet mask is 255.0.0.0.

IP addresses belonging to class A are assigned to the networks that


contain a large number of hosts.

The network ID is 8 bits long.


The host ID is 24 bits long.

Class B – starting with number 128 to 191, for e.g., 172.25.96.210, 129.0.1.10
The Fixed Subnet mask is 255.255.0.0.

IP address belonging to class B is assigned to networks that range


from medium-sized to large-sized networks.

The network ID is 16 bits long.


The host ID is 16 bits long.

Class C – starting with number 192 to 223, for e.g., 192.168.1.1, 201.222.210.22
Fixed subnet mask is 255.255.255.0
IP addresses belonging to class C are assigned to small-sized networks.

The network ID is 24 bits long.


The host ID is 8 bits long.

Class D – starting with number 224 to 239. IP addresses in this class are used for multicast.
No subnet mask is required for Class D IPv4 addresses.
Class D does not have a fixed subnet mask.

IP addresses belonging to class D are reserved for multicasting.


The higher-order bits of the first octet of IP addresses belonging to class D is
always set to 1110. The remaining bits are for the address that interested hosts recognize.

Class E – starting with number 240 to 255. This class is reserved for experimental purposes.
IP addresses belonging to class E are reserved for experimental and research purposes.
Class E does not have a fixed subnet mask.

basic network commands


IPCONFIG

ipconfig (standing for "Internet Protocol configuration") is a console application


program of some computer operating systems that displays all current TCP/IP network
configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and
Domain Name System (DNS) settings.

PING
A ping (Packet Internet or Inter-Network Groper) is a basic Internet program
that allows a user to test and verify if a particular destination IP address
exists and can accept requests in computer network administration.
The acronym was contrived to match the submariners' term for the sound of a returned sonar
pulse.
To test the speed of a data signal.

TRACEROUTING

Traceroute is a widely used command-line utility available in almost all operating systems.
It shows you the complete route to a destination address. It also shows the time
is taken (or delays) between intermediate routers.

Types of networking
LAN -- Local area network WAN -- wide area network MAN -- metropolitan area network
PAN -- personal area network - two types -- wired and wireless
**advantages and disadvantages of CN** some basic points
This majorly has four types:

1.NETWORK TYPES -- 4 TYPES -- LAN,WAN,MAN,PAN -- WIRED AND WIRELESS


NETWORKS.

2.NETWORK COMPONENTS -- It's basic function is to provide connection b/w device and
network.
NIC(network interface card) - allows both wired and wireless communication.
ethernet,wireless,fiber nic's.

SWITCHES - used to connect multi devices in lan and receive data and send to mac(Media
access control).
Your network switch connects to the router through one of the ports on the router.
There are a total 65,535 possible port numbers.specific ports are allocated for specific tasks.
like port 20 and 21 for ftp ,port 22 for ssh and port 80 for http etc.,
port configuration,mac address learning,switching modes and various VLAN.
managed vs unmanaged switches.

ROUTERS - connect multiple networks and allow data transfer, determine optimal path for data
packets and maintain routing tables to make forwarding decisions.
major components are network inter connection,packet forwarding,routing protocols,network
address translation,security and access control,quality of service, wireless routing,routing b/w ip
networks.
Routers play a crucial role in directing data traffic across networks, enabling communication
and data transfer between devices in different networks.

MODEMS - used to connect to isp and convert digital data from a network into a format
suitable for transmission over analog communication lines, such as telephone lines.
modulation and demodulation,types - dial up,dsl,cable,fiber,connection to network,
protocols and standards,integrated functions and isp compatibility.

FIREWALLS - Firewalls are security devices that control and monitor incoming and outgoing
network traffic.
They enforce security policies, block unauthorized access, and protect the network from
malicious activities and threats.
network security,packet filtering,access control,stateful inspection,application-level filtering
idps,nat,vpn,logging and reporting,hardware and software firewalls.
There are 5 different cyber threats and solutions.

Access Points - Access points are devices that enable wireless devices to connect to a wired
network. wireless connectivity,ssid,wireless standards,radio frequency channel,authorization
and encryption,coverage and range,roaming,mesh networking(self configure and organize)
NETWORK CABLES - used to transmit the data b/w devices in a wired network.
twisted,coaxial,fiber,power over ethernet,flat ribbon,serial.

Network Servers: Servers are powerful computers that provide various network services and
resources.
These services can include file storage, email, web hosting, database management,etc.
File Server,Print Server,Web Server,Email Server,Database Server,Domain Name System
(DNS) Server,DHCP Server,Proxy Server,Virtualization Server,Collaboration Servers.

Network attached storage : These devices are specialized storage devices that connect to a
network, allowing multiple devices to access shared storage resources.
There are multiple storage types in this,using a lan or ethernet for storage.

3.NETWORK PROTOCOLS AND STANDARDS --


TCP/IP,WIFI,ETHERNET,HTTP,HTTPS,DHCP,DNS
Ethernet (IEEE 802.3) is the first standard protocol,ip(ipv4 and ipv6),
tcp -- used in providing reliable delivery services.
udp -- used mainly for faster delivery of data and minimal number of overheads.
udp is often preferred over tcp.
icmp -- is used for reporting errors and performing network diagnostics.
icmp is a supporting protocol for internet protocol.
arp -- Address Resolution Protocol (ARP) is a protocol or procedure that
connects an ever-changing Internet Protocol (IP) address to a fixed physical
machine address, also known as a media access control (MAC) address, in a local-area
network (LAN).
dns -- DNS is a directory service that provides a mapping between the name of a host
on the network and its numerical address.
dhcp -- is a client/server protocol that automatically provides an Internet Protocol (IP) host
with its IP address and other related configuration information such as the subnet mask
and default gateway.
SNMP -- SNMP is a protocol used for network management and monitoring.
http -- used for transferring hypertext documents over the internet.
pop3 and imap -- are email retrieval protocols.
ssh -- is used for secure remote access and secure file access.
vpn -- is used for establishing secure connections.

4.NETWORK SERVICES AND TECHNOLOGIES -- IP ADDRESS,VPN,NAT,VOIP,ROUTING.


There are three types of routing: static,dynamic,default.
nat -- network translation.
vpn -- virtual private network.
smtp is a protocol for sending emails between servers.
dhcp is used to configure network devices to communicate on an IP network.

You might also like