CNT Course 1
CNT Course 1
“Computer
Network
Technician”
1
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Index
1 Computer Page# 4 29 Shareware, Freeware, Types of 18
Software,
2 Characteristics of Computer 5 30 19
System Software, Operating System
3 History of Computer 4 31 19
Utility Program, Computer Network
4 Generations of Computer 5 32 Examples of Computer Network 19
5 Classification of Computer, Data, 7 33
Information Network Criteria 20
Benefits Advantages of Computer 20
6 Information Processing Cycle 8 34
Networks, Disadvantage
Components of Computer Input 21
7 Devices 9 35 Types of Computers Networks
Output Devices
8 System Unit, Data Types, CPU 10 36 Computer Architectures 25
2
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
82 Install & Configure DHCP 102 92 Make & Configure Policies 123
83 Make Additional Controller Server 140 93 Make & Configure File Server Resource 155
Manager
3
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
﷽
Computer
Computer is an electronic machine used to solve different problems according to a set of instructions
given to it. A computer can accept data, process data into useful information and store is for later use.
The word computer is derived from compute that means “to calculate”.
Characteristics of Computer
The important characteristics of a computer are as follows:
Speed Consistency
Reliability Communication
Accuracy Recalling
Storage Control Sequence
Versatility Cost Reductions
History of Computer
Computer was invented because “Necessity is the mother of invention “. Man always searched for
a fast calculating device. It took a long time to invent the digital computer.
A brief history behind the invention of the computer is as follows:
Abacus
Abacus was the first computing device. It was developed 5000 years ago. It was used to perform
simple addition and subtraction. Abacus was a wooden rack. It contained horizontal wires with
beads strung on them. The beads could move easily. All simple arithmetic calculations were
performed by moving these beads according to programming rules.
John Napier’s Bone
John Napier was a Scottish mathematician. He created logarithm tables to facilitated
calculations. He also created a device known as Napier’s Bones. The device used rods to
perform arithmetic calculation. It was designed in the early 17th century. The
device was widely used by accountants and bookkeepers.
Blaise Pascal
Blaise Pascal was a French mathematician. He invented a mechanical adding machine in 1642
known as Pascaline Calculator.
Von Leibnitz Charles Xavier Punch cards
Charles Babbage
In 1822, a mathematician Charles Babbage invented a difference engine for mathematical
calculations. In 1842, he developed the Analytical Engine that was automatic. This engine could
perform 60 additions per minute.
4
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Generations of Computer
The development of electronic computer can be divided into generations depending upon the
technologies used. Different generations of computers are as follows:
First generation (Vacuum tube) 1942-1955
Second generation (Transistor) 1955-1964
Third generation (Integrated Circuits) 1964-1975
Fourth generation (Microprocessor) 1975-Present
Fifth generation (Artificial intelligence) Present and Beyond
First Generation Computers (1942-1955)
The beginning of commercial computer age is from UNIVAC (Universal Automatic
Computer).
It was developed by two scientists MAUCHLY and ECHERT at the Census Department of
United States in 1947.The first generation computers were used during 1942-1955. They were
based on vacuum tubes. Examples of first generation computer are ENIVAC and UNIVAC-I
etc.
Advantages
o Vacuum tubes were the only electronic component available during those days.
o Vacuum tubes technology made possible to make electronic digital computers.
o These computers could calculate data in milliseconds.
Disadvantages
These computers were very large in Limited commercial use.
size.
Very slow speed.
They consumed a large amount of
energy. Limited programming capabilities.
They heated very soon due to Used machine language only.
thousands of vacuum tubes.
Used magnetic drums which provide.
They were not very reliable. very less data storage.
Air conditioning was required. Used punch cards for input.
Non- portable Not versatile and very faulty.
Costly commercial production.
Second Generation Computers (1955-1964)
5
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
The second generation computers used transistors. The scientists of Bell Laboratories
developed transistor in 1947. These scientists include John Bardeen, William Brattain and
William Shockley. The size of the computer was decreased by replacing vacuum tubes with
transistors. The examples of second-generation computers are IBM 7094 series IBM 1400 and
CDC 164 etc.
Advantages
© Smaller in size as compared to first © Better speed and could calculated
generation computers. data in microseconds.
© More reliable © Used faster peripherals like tape
drives, magnetic disks, printer etc.
© Used less energy and were not
heated. © Used Assembly language instead of
Machine language
© Wider for commercial use.
© Accuracy improved.
© Better portability.
Disadvantages
Air conditioning was Costly and not versatile
required.
Costly and not versatile.
Constant maintenance was
required. Punch cards were used for
input.
Only used for specific
purposes.
6
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Disadvantages
҈ Air conditioning was required
҈ Highly sophisticated technology required for the manufacturing of IC Chips.
Fourth Generation Computer (1975-Present)
The fourth generation computers started with the invention of microprocessor. The
microprocessor contains thousands of ICs. Ted Hoff produced the first microprocessor in 1971
for Intel. It was known as Intel 4004. The technology of integrated circuits improved rapidly.
The LSI (Large Scale Integration) circuit and VLSI (Very large Scale Integration) circuit
were designed. It greatly reduced the size of computer. The size of modern microprocessors is
usually one square inch. It can contain millions of electronic circuits. The examples of fourth
generation computers are Apple Macintosh and IBM PC workstations. The workstations can
work up to 10 times faster than most PCs due to RISC. It is used in many Macintosh computers.
RISC chips are also cheaper to produces because they require fewer transistors.
Advantages
҉ More powerful and reliable than ҉ Best speed to read instructions i.e.
previous generation. one billionth per second.
҉ Very small in size. ҉ Totally general purpose
҉ Less power consumption and less ҉ Commercial production.
heat generation and less heat
generated. ҉ Less need of repairing.
҉ Fan for heat discharging and thus to ҉ Cheapest among all generations.
keep cold.
҉ All types of high-level languages can
҉ No air conditioning is required. be used in this type of computers.
Disadvantages
҉ The latest technology is required for manufacturing microprocessors.
Fifth Generation (Present and Beyond)
Scientists are now working on the 5th generation computers using recent engineering advances. It
is based on the technique of Artificial Intelligence (AI). Computers can understand spoken words and
imitated human reasoning. The ability to translate a foreign language is also moderately possible with
fifth generation computers.
Scientists are working to increase the speed of the computer. They are trying to create a
computer with real IQ with the help of advanced programming and technologies. The
advancement in modern technologies will revolutionize the computer in future.
Classification of Computer
7
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Computers are classified on the based of size, speed, processing power and price. However, the
classification of computers is not very straight-forward. The distinction between these categories
is sometimes not very clear. Some characteristics overlap different categories. Computers can be
classified into the following categories:
℮ Personal Computer ℮ Mainframe Computer
℮ Mobile Devices ℮ Supercomputer
℮ Minicomputer ℮ Embedded Computer
Data
A collection of raw facts and figures is called data.
Examples of Data
Some examples of data are as follows:
Students fill an admission form when they get admission in college. The form consists of
raw facts about the students. These raw facts are student’s name, father name, address
etc.
Governments collect the data of all citizens of the country during the census. This data is
stored permanently and is used for different purposed at different times.
Different organizations conduct surveys to know the opinion of the people about their
product. In these surveys, people express their ideas and opinions about different issues.
These ideas and opinions of the people are stored as data. The organizations use this data
for the improvement of their products etc.
Information
The processed data is called information. Information is an organized and processed form of
data. It is more meaningful than data and is used for making decisions.
For example the marks of a student in different subjects are data. This data is used to calculate
the total marks which are the information. The total marks can be processed again to calculate
average marks of the student. In this processing total marks is used as data and averaged marks is
the information.
Examples of information
Some examples of information are as follows:
In colleges and universities, the raw facts about students are stored on admission forms. If we
want to find out a list of all students who live in Faisalabad, we will apply some processing
on this data. This processing will give us the desired list. This list is a form of processed data
and will be called information.
The data stored in census is used to generate different type of information. For example,
Government can use it to fine the total number of graduates or literacy rate in the country etc.
The information is obtained by processing the data Government can use the information in
important decisions to improve literacy rate.
An organization can use the opinion of the people as data and process it to generate
information of its interest. For example, it can know that how many people of the country are
8
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
satisfied with the quality of its product and who many are unsatisfied. The organization can
use this information for the improvement of its product.
Information Processing Cycle
A series of steps used to convert data into useful information is known as information processing
cycle. The steps in this cycle are performed in specific sequences.
Different steps in the information processing cycle are as follows: Input the first step of the
information processing cycle is input. The computer accepts data in this step. Data consists of
raw facts and figures. Data is entered into the computer for processing. It is entered using
different input devices such as keyboard or mouse.
1. Processing: The second step of the information processing cycle is processing converts
data into information. Information is an organized and processed form of data. The central
processing unit processes data into information. Random access memory (RAM)
temporarily stores programs and data required by the CPC.
2. Output: The third step of the information processing cycle is output. The results are
provided to the user in this step. It is performed using different output devices such as
monitors and printers.
3. Storage: The fourth step of the information processing cycle is storages. It store data
information and programs used by the computer system. It is performed using different
storage devices like hard disk drives, CD, DVD and USB flash memory etc.
Components of Computer
Different components of a computer system are as follows:
Input Devices
The data or instruction given to the computer is called input. A hardware
component used to enter data and instruction into computer is called input device. Most
commonly used input devices are keyboard, mouse, microphone, scanner, digital camera and
PC camera.
9
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
CPU
CPU stands for central processing unit. It is also called processor. It is the brain of the
computer. It is the most important component of a computer. It interprets and executes the
instructions in the computer. A computer cannot work without CPU. All computers must have a
central processing unit.
Memory
The hardware component that store data and instructions temporarily is called memory. It is also
called primary memory or main memory.
It consists of electronic chips connected to the motherboard. It is used to store input data before
processing. It also stores processed data after processing until the data is sent to the output
device. The main memory is also called volatile because its contents are lost when the computer
is turned off.
CPU
CU
10
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Types of Processors
Two designs of CPU are as follows:
1. CISC stands for complex instruction set computing. It supports a large number of
instructions. It executes complex instruction more quickly. It is mostly used in PC and
conventional mainframe computers. Intel’s Pentium and Hanium are CISC chips.
AMD is another manufacture of CISC chips.
2. RISC stands for reduced instruction set computing. It reduces the Instructions to
only those which are used more frequently.
It executes simple instruction more quickly than CISC CPU. It is mostly used in workstations.
The workstations can work up to 10 times faster than most PCs due to RISC. It is used in many
Macintosh computers. RISC chips are also cheaper to produces because they require fewer
transistors.
Manufacture Processor Type Typical Use
Intel Pentium CISC Microcomputer
Itanium CISC Workstation
AMD Athlon CISC Microcomputer
Hammer CISC Workstation
DEC Alpha RISC Workstation
Motorola PowerPC RISC Apple Computers
Silicon Graphics MIPS RISC Workstation
Pipelining
Pipelining is a technique in which CPU fetches the next instruction before it completes the
machine cycle for the first instruction.
11
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Modern computers use pipelining technique to process multiple instructions at the same time. It
results in faster processing and increases the performance of the computer.
Without pipelining, the processor fetches, decodes, executes and stores only one instruction at a
time, The CPU waits until an instruction completes its all four stages and then executes the next
instruction.
Memory
Memory is an area of a computer that stores data and instructions to be accessed by processor as
well as the results of processing. It consists of one or more chip on motherboard or some other
circuit boards in the computer.
Accessing
The main memory can be viewed as a collection of bytes arranged in an order. CPU can access
any byte form main memory. The byte in the memory can be accessed by specifying its address.
Direct access memory.
Different bytes can be accessed directly in random order in equal amount of time. That is why it
is called direct access memory.
Types of Memory
There are two types of memory in computer that are as follow:
1. Volatile Memory Volatile memory loses its contents when the computer is turned
off. RAM is the most common type of volatile memory.
2. Non-Volatile Memory It does not lose its contents when the computer is turned off.
ROM, flash memory and CMOS are examples of non-volatile memory.
RAM
RAM stands for Random Access Memory. It is also called direct access memory. Random
access means that each individual byte in entire memory can be accessed directly. RAM is used
to store data and instructions temporarily. A program must be loaded into RAM before
execution.
RAM plays very important role in the processing speed of a computer. A bigger RAM size
provides larger amount of space for processing. So the processing speed is increased. The
amount of data that can be stored in RAM is measured in bytes. Most desktop computers
typically have 4 GB or RAM or more.
DRAM
DRAM stands for Dynamic Random Access Memory. It is used in most of the
computer. It is the least expensive kind of RAM. It requires an electric current to
maintain its electrical state. The electrical charge of DRAM decreases with time that may
result in loss of data. DRAM is recharged of refreshed again and again to maintain its
data. The processor cannot access the data of DRAM when it is being refreshed. That is
why it is slow.
SRAM
12
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
SRAM stands for Static Random Access Memory. It can store data without any need of
frequent recharging. CPU does not need to wait to access data form SRAM during processing.
That is why it is faster than DRAM. It utilizes less power than DRAM. SRAM is more
expensive. It is normally used to build a very fast memory known as cache memory.
Cache Memory
A cache (pronounced “cash”) is a small and very fast memory. It is designed to speed up the
transfer of data and instructions. It is located inside or close to the CPU chip. It is faster than
RAM. The data and instructions that are most recently or most frequently used by CPU are
stored in cache.
The data and instructions are retrieved form RAM when CPU uses them for the first time. A
copy of that data or instructions is stored in cache. The next time the CPU needs that data or
instruction, it firs looks in cache. If the required data is found there, it is retrieved form cache
memory instead of main memory. It speeds up the working of CPU.
Levels of cache memory
1. Level 1(L1) Cache
2. Level 2(L2) Cache
3. Level 3(L3) Cache
Flash Memory
14
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Flash memory consists of non-volatile memory chips. Most computer use it is store startup
instructions as it allows computer to update its contents easily. Flash memory chip are also built
into many devices such as tablets, mobile phones, digital cameras, printers and digital cameras
etc. The data in smart phones are stored on flash memory. Some portable media players store
music on flash memory chip.
USB Flash Drives
USB flash drive is a flash memory storage device that is connected to a USB port in computer or
mobile device. It is also called thumb drive, Key drives, or jump drives.
Memory Cards
A memory card is a removable flash memory to store data. Most of these are very small and can
retain data without power. The existing data can be erased and new data can be written easily.
Memory cards are available in many shapes and sizes. They are commonly used with smart
phones, portable media players. Digital camer and other portable devices.
A memory card can be inserted into a slot on computer or mobile devices. However, a card
reader can be attached to the computer if it does not have a slot. The card reader is usually
connected to the USB port of the computer. The card readers are designed to read multiple types
of memory cards.
Storage
Storage is used to store data, information and programs permanently. It is also known as
secondary storage, auxiliary storage or mass storage.
Ω The main memory is a temporary memory. The storage is required to store data and
programs permanently.
Ω The capacity of main memory is limited. The storage is required to store a large amount
of data and programs.
Different storage media are used to store data information and programs. It is called nonvolatile
because its content remains safe even if the computer is turned off. Storage media are available
in different sizes and capacities. The storage media can be a removable, flash drives memory
cards and optical discs etc.
Basic Units of Data Storage
The basic unit of data storage is as follow:
Bit Computer works with binary digits. These digits are in the form of 0,s and 1’s A binary
digit is called bit. One bit takes one storage location in memory. It is the smallest unit of
data storage.
Byte A collection of eight bits is called byte. It is used to store single character.
Kilobyte A kilobyte consists of 1024 bytes (210 bytes). It is denoted by KB.
Megabyte A megabyte consists of 1024 kilobytes (220 bytes). It is denoted by MB.
Gigabyte A gigabyte consists of 1024 megabytes (230 bytes). It is denoted by GB.
Terabyte A terabyte consists of 1024 gigabytes (240 bytes). It is denoted by TB.
Petabyte A petabyte consists of 1024 terabyte (250 bytes).It is denoted by PB.
Exabyte An Exabyte consists of 1024 petabytes (260 bytes). It is denoted by EB.
15
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Hard Disk
Hard disk is the primary storage device in a computer to store the programs and data
permanently. It is also known as hard disk drive (HDD) or hard drive (HD). Most personal
computers have at least one hard disk drive. Some large scale computers contain hundreds of
hard disks. The capacity of hard disk can be up to 8 TB or more.
Fixed disk
The traditional hard disk is a type of magnetic disk. It is also called fixed became it is fixed in
the system unit.
Platters
It consists of several circular disks called platter that are coated with magnetic material.
The platter is stacked on the top of one another enclosed in a sealed case. Each platter has two
read/ write heads, one for each side. The hard disk also has arms that move the read/write heads
to the proper location on the platters to read and write data. The platters in the hard disk typically
spin at a high rate between 5400 and 15000 revolution per minute (RPM).
The user can write and read data from the hard disk many disk many time. The disk must be
formatted before any data can be written on a hard disk.
Formatting
Formatting is a process that creates tracks and sectors on the disk.
Tracks
Tracks are in the form of circles on the surface of a hard disk. Each track on a disk is divided into
sectors. Each sector typically stores up to 512 bytes of data. Two or more sectors can be
combined to form a cluster. A cluster is the smallest unit of disk space that stores data. All tracks
in the same position on all surfaces of all disks in a hard drive form a cylinder.
Hard Disk Performance
The following factors affect the performance of hard disk:
Seek time It is also called positioning performance. It is the time required by read/write head
to reach the correct location on the disk. It is often used with rotational speed to
compare performance of hard drives. It is measured in millisecond (ms)
Spindle speed It is also called transfer performance. It is the speed at which the drive transfers
data. It is measured in revolutions per minute (RPM).
Latency It is the time required by the spinning platter to bring the desired data to
read/write head. It is measured in milliseconds (ms).
Floppy Disk or Diskette
Floppy disk is also called diskette. It consists of a then plastic disk coated with magnetic
material. This disk is enclosed in a plastic jacket. It was introduced by IBM in early
16
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
1970s. It is a portable storage medium and can be removed from one computer and
inserted into another computer easily. It is not commonly used now days. Floppy disk can
only store a small amount of data. Data access speed of floppy disk is slower than hard
disk. It is inexpensive storage media.
The standard size of floppy disk in 3 ½ inch. The capacity of floppy disks is 1.44MB.
Optical Disc
Optical disc is a form of removable storage. It includes CDs, DVDs and Blu-ray discs. Optical
drives use a laser to read and write data on optical disc. The LASER stands for Light
Amplification through Stimulated Emission of Radiation. Laser beam writs on the surface by
creating small pit (hole) in the disc.
CD DVD-ROM
DVD DVD-R
CD-ROM DVD-RW
CD-R Blu-Ray Disc
Software
A set of instructions given to the computer to solve a problem is called software. Software is also
called program.
Hardware
The physical parts of the computer are called hardware. The user can see and touch the hardware.
Keyboard and mouse are two examples of hardware.
Relationship of Software and Hardware
Software is a set of instruction that tells the computer Hardwar what to do. The hardware cannot
perform any task without software. The software cannot be executed without hard ware. A
computer becomes useful when hardware and software and combined.
Difference between Software & Hardware
The difference between software and Hardware is as follows:
No Software No Hardware
1 Software is asset of instructions that tell a 1 Hardware is the physical parts of the
computer exactly what to do. computer that cause processing of data.
2 Software cannot be executed without 2 Hardware cannot perform any task
hardware. without software.
3 Software cannot be touched. 3 Hardware can be seen and touched.
4 Software is debugged in cased of 4 Hardware is repaired in case of problem.
problem.
5 Software is reinstalled if the problem is 5 Hardware is replaced if the problem is
not solved. not solved.
Application Software
17
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Application software is used to perform various applications or tasks on the computer. Today, a
wide variety of application software is available to meet any user need. Individuals and
businesses use application software to perform hundreds of tasks such as:
Writing letters Designing and editing images
Making presentations Accessing the Web-base3d resources
Managing finances Participating in videoconference
Managing business inventory Playing games
Preparing tax returns
18
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
1. Performance
Performance can be measured in different ways such as transit time and response time.
Transit time is the time required for a message to travel form one device to other.
Response time is the3 time elapsed between and inquiry and the response. The network
19
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
2. Reliability
The reliability of the network is measured by different factors such as accuracy of data delivery.
It also includes the frequency of failure and the time taken to recover from the failure etc.
Security is the protection of data from unauthorized access, damage. It also includes the
implementation of policies and procedures for data recovery if it is lost or damaged.
Benefits/ Advantages of Computer Networks
Following are some important benefits of computer networks:
1. Information & Resource Sharing
Data and information can be shared among different users. Resources like printers, CD-
ROM drives. Hard and software can also be shared.
2. Money Saving
People can save a lot of money by using the same software over a network instead of purchasing
separate copy of the software for each user.
3. Easy Communication
A person can communicate with others very easily using a large network like Internet.
6. Entertainment
Networks facilitate many types of games and entertainment. Internet offers many sources of
entertainment. Many multi-player games can be used over a local area network.
Disadvantages of Networks
20
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
3. Undesirable Sharing:
Networking allows the sharing of undesirable data. Viruses are easily spread over networks and
the Internet.
4. Illegal or Undesirable Behavior:
Networks can be used for abuse of company resources, downloading of illegal or illicit materials
and software piracy. Larger organizations manage these issues through policies and monitoring.
21
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
transmit data in a limited distance. There is also a limit on the number of computers that can be
attached to the network.
Examples
In a computer lab, there are 40 computers connected through LAN. The students can
share software files and data in the lab.
In Internet club, many computers can be connected through LAN. These computers can
share single connection of the Internet.
Benefits / Advantages of LAN
Some important advantages of LAN are as follows:
1) Resource Sharing
The resources like printers, CD-ROM drives hard disks and software can be
shared using LAN. This is cheaper than buying devices for each workstation in
the network.
2) Communication
The users in LAN can easily communicate with each other. They can also transfer
data easily and rapidly between different computers in the network.
3) Application Sharing
The individual licensed copy of software can be costly. A lot of money can be
saved by using the same software over networks instead of purchasing separate
copy of the software for each workstation. The network versions of software
application such as MS Office are available. These applications are loaded on the
server and shared by different users in the LAN.
4) Centralized IT Admin
LAN allows an easier and more efficient way to manage different computers from
server. IT administrator can remotely troubleshoot the problems on computers
across the network instead of doing in individually.
5) Centralized Data
The users can save their data centrally on the server in LAN. They can access the
saved data from any workstation on the networks. They do not need to use the
same workstation all the time.
6) Internet Access Sharing
LAN allows multiple users to share a single Internet connection. An organization
can purchase one high- speed connection and share it on different workstations in
LAN.
7) Data Security & Management
LAN can manage important data in a better way. Data can be centralized on
shared servers instead of storing it on different computers. Everyone can find the
data easily. Security can be implemented easily.
22
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
23
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Remote data entry is possible in WAN. The user can sit at any location and enter, update and
process data on any computer attached to WAN. For example the user can access the data on a
computer located at Karachi while sitting in Faisalabad.
3. Centralized Data
The centralized data storage is an important advantage of WAN. It means that data can be stored
in single location even if the organization is spread over many cities. WAN can manage critical
data in a better way by storing it at a centralized server. The centralized data can be shared
among different users anywhere in the world.
4. Entertainment
WAN such as the Internet can provide many types of games and entertainment to the user. Many
multi-player games are available that can be played over WAN.
Disadvantages of WAN
Some important disadvantages of WAN are as follows:
҉ Hardware, Software & Setup Costs: Setting up a WAN requires an investment in
hardware software planning designing and implementing. The cost of devices used in
WAN is very expensive.
҉ Hardware & Software Management Costs: Managing a WAN is complicated. It requires
intensive training. A network manager usually needs to be employed.
҉ Data Security Concerns: A poorly –secured WAN puts critical data at risk. It may expose
data to hackers, unauthorized access and even sabotage. Virus can spread quickly across
the WAN if it enters the central backing store.
҉ Failure of Server: If a server fails, all computers connected with the server are affected.
24
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Network Architectures
Network architecture is the design of computers and other devices in a network and how they
communicate. The two most common network architectures are client-server and peer-to-peer
(P2P).
Peer-to-Peer Network
Peer-to-Peer is a simple and inexpensive network. It normally connects less than ten computers.
Each computer in this network can share hardware data or information of any computer in the
network. Each computer stores files on its own storage devices.
The network operating system and application software installed on all computers. Any
computer in the network can use the resources of any other computer in the network. Peer-to-
Peer networks are suitable for small businesses and home uses. Windows provides peer-to-peer
network utility.
Advantages
Some important advantages of peer- to peer network are as follows:
It is easy to setup.
25
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
It is easy to maintain.
It does not require expensive server computer.
It is suitable form small office of ten or less computers.
Disadvantages
The disadvantages of peer-to-peer network are as follows:
Heavy use can slow down the networks speed.
It also provides less security of data because files are stored at different
locations in the network.
Client-Server Network
Client-server is a network in which one or more computers work as server and other computers
work as clients. The sever computer provides services for the clients. Server is also called host
computer. It controls access to the hardware and software on the network and provides
centralized storage area for programs data and information.
Client computers request resources form the server. Server computer is more powerful than
client computer and contains more memory.
Some severs are known as dedicated servers. A dedicated server is used to perform a specific
task. For example, file server is used to store and manage files. Print server is used to manage
printers and print jobs. Network server is used to manage network traffic.
Advantages
Some important advantages of client-server network are as follows:
It reduces the volume of data traffic on the network.
It also provides faster responses to the clients.
It can use less powerful computer as clients because most of the processing is
done by the server computer.
Disadvantages
© It is expensive model because server computers are costly.
© The operations stop all over the network when server goes down.
Network Topologies
A network can be configured or arranged in different ways. The physical layout or arrangement
of connected devices in a network is called topology. It is the shape of a network. Different
network topologies are as follows:
Δ Bus Topology Δ Ring Topology
Δ Tree topology Δ Mesh Topology
26
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Δ Star Topology
Bus Topology
Bus topology is the simplest topology and supports a small number of computers. In
but topology, all computers or network nodes are connected to common communication medium.
This medium is often a central wire known as bus. The terminators are used at the end of bus to
absorb signals
Working of Bus Topology
The sending computer sends the data and destination address through the bus. The data and
address move from one computer to the other in the network. Each computer checks the address.
If it matches with the address of a computer, the computer keeps the data. Otherwise the data
moves to the next computer.
Advantages
It is simple and easy to use.
It requires small length of cable to connect computers.
It is less expensive.
It is easy to extend a bus. It allows more computers to join the network.
If one node fails it does not affect the rest of the network.
Disadvantages
It is difficult to troubleshoot.
It only supports small number of computers.
If numbers of computer increases the of the network slow.
Star Topology
All computers in star topology are connected with the central device called hub. Star
topology is mostly used in client-server networks.
Working of Star Network
The sending computer sends the data to the hub. The hub sends data to the receiving computer.
Each computer in star network communicates with a central hub.
Advantages
o It is easy to maintain and modify the network.
o Adding or removing computer can be done without disturbing the network.
o Finding the faults becomes very simple.
o Single computer failure does not bring down the whole network.
o It is more flexible among the remaining topology.
Disadvantages
27
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
In a mesh topology every device in the network is physically connected to every other device in
the network. A message can be sent on different possible paths form source to destination. Mesh
topology provides improved performance and reliability. Mesh network are not used much in
local area networks. It is mostly used in wide area networks.
Advantages
Ω The use of dedicated link guarantees that each connection can carry its own data load. It
eliminates the traffic problem.
Ω It one link becomes unusable, it does not harm the entire system.
Ω It is easy to troubleshoot.
Disadvantages
Ω A full mesh network can be very expensive.
Ω It is difficult to install and reconfigure.
Dialup Modem
Modem is a communication device that sends and receives data from one computer to another on
the internet through telephone lines. The sending and receiving computers both must have dialup
modems.
Computer stores information in the form of digital signals. However, the information
transmitted over the telephone lines is in the form of analog signals. The dialup modem receives
data from computer in digital form and converts it into analog form .This process is called
modulation. It sends analog signals to other computer using telephone lines. The dialup modem
on receiving computer receives data in analog form. It converts the analog data back into digital
form. This process is called demodulation.
Digital Modem
Digital modem is also called broadband modem. Different types of digital modems. Are as
follows:
1. ISDN Modem 2. DSL Modem 3. Cable Modem
Wireless Modem
Wireless modem transmits the data signals through the air instead of cable. It is also known as
radio-frequency modem. It is designed to work with cellular technology and wireless local area
networks. Most handheld computers, smart phones and other mobile devices use the wireless
modem to connect to the Internet wirelessly. It can also be used with notebook and desktop
computer.
29
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
A wireless network card is used to transmit data wirelessly. It usually has an antenna that can be
positioned properly form the best signals. An amplifier can be used for increasing the signal
strength. Some network cards support wired as well as wireless networks.
Wireless Access Point
A wireless access point is a communication device that allows the computer and other devices to
transfer data wirelessly among themselves or to a wired network. It acts as central transmitter
and receiver of wireless radio signals. It has antennas to provide better signals.
The wireless access points support Wi-Fi and are most commonly used to support public Internet
hotspots at airports, hotels or coffee shops etc. They are also used in business network where
larger buildings and spaces need wireless coverage.
Hub
A hub also called concentrator or multistation access unit (MAU). It provides a central
point for cables in a network. Hubs also transmit and have multiple ports to which devices are
connected.
Hub connects the computers to a network. It broadcasts all messages to every computer on the
network but only the intended recipient computer takes the message. The computers that are not
the recipients of the message ignore the message. A hug can handle only one-way information
traffic at a time.
Types of Hub:
1. Active Hub
2. Passive Hub
Switch
Network switch is more intelligent device than hub. The switch improves the efficiency of the
data transfer in the network. It receives a message from any device connected to the network and
then transmits the message only to that device for which the message was meant. It can also
handle multiple communications channels at the same time.
Routers
A router is a communication device connects multiple networks using similar or different
protocols. It manages the best route between any two communication networks Routers are used
when several networks are connected together. A router can be used on a network of any size. It
can connect networks of different countries. They transfer data in less time. The router is an
intelligent device. It uses algorithms to find out the best path transfer data to a network.
Gateway
Gateway is a device connects two or more networks with different types of protocols. It is an
intelligent device. It can convert data according ot the protocol. A gateway can be used to
connect a personal computer network to mainframe computer network.
Bridge
A network bridge can be used in computer networks to interconnect two LANs and to separate
network segments. A segment is a section of a network.
When a bridge receives a signal, it determines the segment where the signal should be sent. It
reads the addresses of sending and receiving computers. The bridge does not pass the signal to
the other segment it sending and receiving computers are both in the same segment. It reduces
network traffic and increases network performance.
30
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
32
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Microwave System
Microwave is radio waves that are used to provide high-speed transmission. Both
voice and data can be transmitted through microwave. Data is transmitted through the air from one
microwave station to another similar to radio signals.
Microwave uses line-of- sight transmission. It means that signals travel in straight path and cannot
bend. The microwave stations or antennas are usually installed on high towers or buildings. The
stations are placed within 20 to 30 miles to each other. Each station receives signal from previous
station and transfer to the next station. In this way data transferred from one place to another. There
should be no buildings or mountains between these stations.
Satellite Communication
Satellite communication is a space station that receives microwave signals from earth-
based station. It amplifies the signals and retransmits them back to different earth-based stations. The
satellite communication is placed about 22,300 miles above the earth. The transmission from earth-
based station to satellite is called uplink. The transmission from satellite to earth-based station is
called downlink
The data transmission of satellite communication is very high. However, bad weather can affect the
quality of satellite transmission. Satellite communication is used in different applications such as
television and radio broadcasts weather forecasting global positioning system and internet
connections etc.
Broadcast Radio
Broadcast radio is a wireless transmission medium. It distributes radio signals
through the air over long and short distances. Radio transmission requires a transmitter to send
broadcast radio signals and a receiver to receive. The receiver used and antenna to receive the
signals. Some networks use transceiver that can both send and receive signals.
An example of short-range broadcast radio communications is BluethoothTM . It uses short-range
radio waves to transmit data at a rate of 1 Mbps among Bluetooth- enabled devices. BluethoothTM is
used in personal computers, Internet appliances, cellular phones, fax machines and printers.
Cellular Communication
Cellular communication is a wireless communication system. It is widely used all
over the world for mobile communication. A cellular communication system is used to transmit text,
images, voice and video.
Cellular communication divides physical region into different sections known as cells. For example,
a city can be divided into small cells. Each cell has a low-powered radio transmitter/receiver. The
cells are close enough to one another so that the signal strength is maintained throughout the area.
These cells are linked together to enable a large number of cellular phones to communication with
one another.
33
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
1. Sending Device
A device that sends the message is called sending device. It is also called source or transmitter. The
sending device can be a computer, fax machine or mobile phone etc. Computer is usually used as
sending device in communication system.
2. Receiving Device
A device that receives the message is called receiving device. It is also called sink. The receiving
device can be a computer, printer, fax machine or mobile phone etc. A computer is usually used as
receiving device in communication system.
3. Communication Devices
Communication devices are used to transmit messages between sending and receiving device
through communication medium. The sending and receiving devices must contain communication
devices for communication. Two most commonly used communication devices are modem and
network card.
4. Transmission Medium
Transmission medium is used to carry messages from one place to another. It is also called
communication channel. The transmission medium can be a physical cable or wireless
connection.
Data Transmission Modes
The way in which data is transmitted from one place to another is called data transmission modes.
There are three types of data transmission modes known as simple mode, half duplex mode and full
duplex modes.
1. Simplex Mode
In simplex mode data can flow only in one direction. It cannot be moved in both
directions. It operates in a manner similar to a one-way street; the direction of flow never changes. A
device with simplex mode can either send or receive data. It cannot perform both actions.
Example
A B
An example is a traditional television broadcast. The signal is sent form the transmitter to TV
antenna. There is no return signal.
2. Half-Duplex Traffic
In half- duplex mode, data can flow in both directions but not at the same time. It is
transmitted one-way at one time. A device with half-duplex mode can send or receive data but not at
the same time. That is why the speed of half-duplex mode is slow.
A B
Example
35
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Internet surfing is an example of half-duplex communication. The user issues a request for a
webpage. The webpage is downloaded and displayed before issuing another request.
3. Full –Duplex Mode
In full-duplex mode data can travel in both of data transmission as compared to half
duplex. Time is not wasted in changing the direction of data flow.
A B
Example
A telephone is a full-duplex device. Both persons can talk at the same time. Another example of full-
duplex communication is automobile traffic on a two-lane road. The traffic can move in both directions at the
same time.
FAT
FAT stands for File Allocation Table (FAT). The file table is used by the operating system to locate file on a
disk. A file may be divided into many sections and scattered around the disk due to fragmentation. FAT keeps
track of all pieces of a file. In DOS systems, FAT is stored after boot sector. The file system has been used
since the advent of PC.
Features of FAT
Some important features of FAT are as follows:
1. Naming Conventions
FAT file system used by MS-DOS provides file name of only 8 characters long.
FAT file system used by Windows 2000 supports long file name. The full path of file
including filename can be up to 255 characters long.
File names can contain spaces and multiple periods. The characters after the last period are
treated as file extension.
2. Security
FAT does not support local and folder security. A user logged on a computer locally has full access to the
files and folders in FAT partition(s) of the computer.
Ω File Type The text files takes less accessed time compared to graphics file.
Ω File Size The access speed is better if the file is of smaller size.
Ω Partition Size The smaller partition size gives greater access speed. The size smaller
36
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
than 500MB have better file access in FAT. NTFS is required for bigger
partition sizes
Ω Fragmentation The small portions of free spaces on a disk are called fragments. The access
Ω Number of files in a folder Access speed increases if there is less number of files in the folder.
FAT32
FAT32 is the newer version of FAT. It allows a maximum partition size of 32GB and a maximum file size of
4 GB. FAT32 was used in some earlier versions of Windows. It does not provide the security-related features
as NTFS. FAT32 also has size limitations and does not allow to creating a partition greater than 32 GB. The
maximum file size that can be stored on FAT32 file system is 4 GB
NTFS
NTFS stands for New Technology File System. It is the primary file system used in Windows 7, Windows
Vista, Windows 2000 and Windows NT. It supports much larger hard drives and file than FAT or FAT32. It
also offers better security and error-recovery capabilities.
Features of NTFS
Some important features of NTFS are as follows:
1. Naming Conventions
Security
NTFS provides file and folder security. File and folders are safer than FAT. Security is maintained by
assigning NTFS permission to files and folders. Security is maintained at the local level and the network
level. The permissions can be assigned to individual file and folders. Each file or folder in an NTFS partition
has an Access Control List. It contains the users and group security identifier (SID) and the privileges
granted to them.
2. Partition Size
37
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
The NTFS partition and file sizes are much bigger than FAT partitions and file. The maximum size of an
NTFS partition or file can be 16 Exabyte’s. However, the practical limitation is two terabytes. The file size
can be in the range of 4GB to 64GB
3. File Compression
4. High Reliability
NTFS is highly reliable. It is a recoverable file system. It uses transaction logs to update the file and folders
logs automatically. The system also the system also has a great amount of fault tolerance. It means that if a
transaction fails due to power or system failure the logged transactions are used to recover the data.
NTFS supports bad-cluster mapping. It means that file system detects bad clusters or areas of disk with errors.
If there is any data in those clusters, it is retrieved and stored on another area. The bad clusters are marked to
prevent data storage in those areas in future.
CDFS
CDFS is the system for compact disk storage media. Windows 2000 also supports it. It is a 32-bit program
helping in interpreting data.
FAT NTFS
1. It provides no security if the user logs in It provides security for both local and remote
locally. The file and folder level security users. The security is provided to level of files
permission does not exist. and folders.
2. It supports only 8 characters long It supports 255 characters long file name.
filename.
38
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
3. It is suitable for a partition of that is less It is suitable for partition that is greater than
than 500MB. 500MB.
4. Partitions and file size can be up to 4 Partitions size can be up to 16 Exabyte’s.
GB.
5. It supports no file compression. It supports file compression.
6. Disk can get fragmented thus slowing It provides lesser possibility or fragmentation.
down the access.
7. It is not very reliable since it does not It is highly reliable since it supports bad cluster
support bad cluster mapping mapping and transaction logging.
OSI Model
OSI stands for Open System Interconnection. An open system is a set of protocols that allows any
two systems to communicate even if their architectures are different. It covers all aspects of network
communications. It was developed by the International Standards Organization (ISO) in 1983
Advantages of OSI Model
Some advantages of OSI model are as follows:
It divides the network communication process into smaller and simpler components.
It allows multiple-vendor development via standardizations of network components.
It encourages industry standardization to define what functions occurs at each layer.
It allows various types of network hardware and software to communicate.
It prevents changes in one layer from affecting the other layers.
Layers of OSI Model
The function of each layer (from bottom to top) is as follows:
1 Physical layer
Physical layer is the bottom layer of OSI model. It transmits steam of bits and defines how the data
is transmitted over the network and what control signals are used. Its main function is to control how
a steam of bits is sent and received over the physical medium. The common protocols used at this
level are IEEE 802, Ieee802.2, and FDDI.
Physical layer must decide the following:
Characteristics of Media The physical layer defines the characteristics and type of
transmission medium.
Representation of Bits The bits are encoded into electrical signals for
transmission. The physical layer defines the type of encoding.
39
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Access Control If two or more devices are connected to the same link, data link layer
determines which device has control over the link at a given time.
Data Link Layer Is Divided In Two Sub-Layers:
LLC
LLC stands for Logical Link Control. It is the upper sub-layer. It ensures reliability
or physical connection. The standard protocol IEEE 802.2 is the most commonly used
standard. Point-to-Protocol (PPP) is an important standard at this OSI level. It is used
to communicate across point-to-point links. It is an important protocol for wide area
networking.
MAC
MAC stands for Media Access Control. It specifies how workstations cooperatively
share the transmission medium. The IEEE 802.3 Standard specifies a medium-access
method known as “carrier sense multiple access with collision detection
(CSMA/CD).”
3 Network Layer
The network layer is responsible for establishing maintaining and terminating
network connections. It manages the delivery of data from source to destination.
Network layer determines logical path between the sender and the receiver. There
may be many networks between two computers. This layer manages to send data
from the source computer to the destination computer. The common protocols that
operate at this level are IP, IPX, and X.25.
Some responsibilities of network layer are as follows:
Logical Addressing
40
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
The logical addressing implemented by data link layer handles the addressing problems locally. If a
packet passes the network boundary another addressing system is required to distinguish the source
and destination systems. The network layer adds a header to the packet that comes from the upper
layer. The header includes the logical addresses of the sender and receiver.
Routing Routing or gateways are used to route packets to their final destination
when independent networks are connected gateways to form an inter-network. This
mechanism is provided by the network layer.
4 Transport Layer
The transport layer controls the flow of data. It ensures that messages are delivered
error free. It divides large messages into small packets for efficient transmission.
These packets are reassembled, checked for errors and acknowledged at receiving
side. Data is retransmitted if there are errors in transmission. The common protocols
that operate at transport layer are TCP, UDP, SPX and NetBEUI.
Some responsibilities of transport layer are:
Service-Point Addressing
Computer can run multiple processes at the same time. The source-to-
destination delivery means the delivery from one computer to another
computer. Transport layer header includes service-point address or
port address. The network layer gets each packet to correct computer.
Transport layer gets entire message to the correct process on that
computer.
Segmentation & Reassembly A message is divided into segments. Each segment has a sequence
number. Transport layer uses these numbers to reassemble the
message correctly on destination computer.
Connection Control Transport layer can be connection-oriented or connectionless. A
connection-oriented transport layer establishes connection with
transport layer of destination computer before delivering packets. The
connection is terminated after delivering all data. A connectionless
transport layer of destination computer as independent packet.
Flow Control Transport layer performs flow control end to end rather than across a
single link.
Error Control Transport layer performs error control end to end rather than across a
single link. The sending transport layer ensures that the message is
delivered to the receiving transport layer. Error correction is normally
performed via retransmission.
5 Session Layer
The session layer establishes, manages and terminates user connections. A session is an exchange of
messages between computers. It synchronizes user tasks. Synchronization involves the use of
checkpoints in the data stream. If a failure occurs only the data from the last checkpoint is
retransmitted.
Suppose we want to send 1000 pages of data. Checkpoint can be used after each 100 pages. If there
is an error at page 320, the pages from 301 will be retransmitted. Page from 1 to 300 will not be
retransmitted. Winsock and NetBIOS are usually shown as functioning at the session layer.
6 Presentation Layer
41
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
1. Network Layer
TCP/IP network layer defines the protocols used for addressing and routing the data packets. The
protocols that are part of TCP/IP network layer are IP, ARP, ICMP and IGMP.
2. Transport Layer
The transport layer was represented in TCP/IP by two protocols called TCP and UDP. IP is a host-
to-host protocol and can deliver a packet from one physical device to another. UDP and TCP are
transport level protocols and are responsible for delivery of a message form one process to another
process. A new transport layer protocol SCTP has been devised to meet the needs of some newer
applications.
3. Application Layer
The application layer in TCP/IP is equivalent to the combined session, presentation and application
layers of OSI model. Many protocols are defined at this layer.
Protocol
A standard used by networks for communication between different devices connected to a network is
called protocol. It represents an agreement between the communication devices. A protocol defines
what communication is, how it is communicated and when it is communicated. The device cannot
communicate without a protocol.
Functions of Protocols
The main functions of protocols are as follows:
1. Data Sequencing A process of breaking a long message into smaller blocks is called
data sequencing. A long message is divided into smaller packets of
same size. This technique reduces the amount of data that is
retransmitted if an error is detected.
2. Data Routing Data routing is the process of finding the most efficient part
between source and destination before sending data. This technique
increases the efficiency of data communication.
3. Data Flow All computers are not equally efficient in speed. Data flow is a process
that controls data transmission properly if the sender computer is faster
than the receiver computer.
no collision can occur. But the data transmission rate is slow. When computer wants to send a
message it:
1. Gets the token.
2. Puts the data in the token.
3. Adds the address of receiving computer.
Token ring is based on ring topology but can also be used in star topology. The token passes from
computer to computer. The computer whose address matches with the address stored in the token
gets the data. It then returns the message to the sending computer to indicate that the data has been
received. Token ring network have data transfer rate from 4 Mbps to 1Gbps.
TCP/IP
TCP/IP stands for transmission control protocol/Internet protocol. It is the most widely used
communications protocol today. It is used to transfer data over the Internet and consists of two
protocols. The Transmission Control Protocol (TCP) is responsible for the delivery of data and
Internet Protocol (IP) provides addresses and routing information.
TCP/IP uses packet switching to transmit data over the Internet. In this process, data is divided into
small pieces called packets to be transferred over the Internet. The packets are reassembled in the
proper order when they reach the destination. These packets travel via devices called routers.
Bluetooth
Bluetooth is a network protocol that defines the method for transmission of data between two
bluetooth devices using short-range radio waves. The devices can transfer data at a rate of up to 3
Mbps using Bluetooth. The devices must be within a distance of 33 feet. However, the distance can
be extended using additional equipment.
A Bluetooth device uses a mall chip to communicate with other Bluetooth.
Wi-Fi
Wi-Fi is developed by IEEE and specifies how two wireless devise communicate over the air with
each other. It is a family of wireless networking standards that uses IEEE 802.11 standard. There are
various versions of the standard that support different speeds and distances. The common standards
include 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ad. It provides a data transfer
rates form 11 Mbps to 7Gbps. Most mobiles, computers and smart phones are Wi-Fi-enabled.
An example of Wi-Fi network is the hot spot. A hotspot can be used by a mobile user to connect to
the Internet using Wi-Fi enabled computers and devices. Wi-Fi can also be used to connect
computers wirelessly at home and small business. The distance between different computers or
devices can be up to 300 feet in open areas and about 100 feet in closed areas.
802.11 standard Maximum speed
802.11b 11 Mbps
802.11g 54 Mbps
802.11n 300-600 Mbps
802.11ac 1.8-3.6Gbps
802.11ad 6.7Gbps
IP Addressing
44
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
The MAC address provides the physical address for the network interface card. However, it does not
provide any information about the location of its network. Internet Protocol (IP) addressing provides
a solution to worldwide addressing by using a unique address that identifies the computer’s local
network. IP network numbers are assigned by Internet Assigned Numbers Authority (IANA).
This agency assigns IP addresses to computer networks. It ensures that no two different networks are
assigned the same IP network address.
IP addressing are classified as IPv4 or IPv6 version 4 (IPv4) is the current TCP/IP addressing
technique being used on the Internet. The address space for IPv4 is quickly running out due to the
rapid growth of the internet and the development of new Internet-compatible technologies. However,
both IPv4 and IPv6 are supported by manufacturers of networking equipment and the latest
computer operating systems.
IP version 4 (IPv4) is the current TCP/IP addressing technique being used on the Internet. It is also
the preferred technique for providing addresses in the LAN. A typical IP address is written as
216.27.61.137. The IP address is written in decimal format. But IP address in computer is written in
binary form as follows:
11011000.00011011.00111101.10001001
The four numbers in an IP address are called octets because each part contains eight positions in
binary form. If all positions are added together, it gives 32. That is why IP addresses are considered
32-bit numbers.
Each position in an octect can have two different states (1 or 0). It means that the total possible
combinations per octet is 28 or 256. Each can contain any value between 0 and 255. A combination
of four octets gives 232 or a possible 4,294,967,296, unique values.
Some certain values are restricted form use as typical IP addresses. For example the IP address
0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts.
The octets are used to create classes of IP address that can be assigned to particular business,
government or other entity based on size and need. The octets are divided into two sections of Net
and Host the Net section always contains the first octet. It is used to identify the network in which a
computer exists. Host (or Node) identifies the actual computer on the network. The Host section
always contains the last octet.
Class A
The class A is used for very large networks such as an international organization. The IP
addresses of this class are from 1 to 126. The other three octets are used to identify each host. It
means that there are 126 networks in Class A.
45
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Each network has 16,777,214 (224 - 2) possible hosts for a total of 2,147,483,648 (231) unique IP
addresses. In Class A network, the value of high order bit in the fires octet is always 0.
Loopback Address: The IP address 127.0.0.1 is used as loopback address. It means that it is
used by the host computer to send a message back to itself. It is commonly used for troubleshooting
and network testing.
Example
0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh
The first bit is 0.
The next 7 bits represent the network.
The next24 bits represent the host.
The initial byte can be from 0 -127.
Total address in Class A are 126 (0 and 127 are reserved).
16,777,214 hosts on each Class A.
Class B
The class B is used for medium-sized networks. The IP addresses of this class are from 128
to 191. Class B addresses also include the second octet as part of net identifier. The other two octets
are used to identify each host. It means the there are 16,384 (214) networks in Class B. Each network
has 65,534 (216 – 2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B
networks have a fires bit value of 1 and a second bit value of 0 in the first.
Net Host or Node
145.24 53.107
Example
10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh
The first two bits are 10.
The next 14 bits represent the network.
The next 16 bits represent the host.
The initial bytes can be from 128 – 191.
Total addresses in Class B are 16,384.
65,532 hosts are available on each Class B.
46
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Class C
The class C addresses are commonly used for small to medium-size organization. The first of
the IP addresses of this class is from 192 to 223. Class C addresses also include the second and their
octets as part of the net identifier. The last octet is used to identify each host. It means that there are
2,097,152 (221) network in class C. Each network has 254 (28 -2) possible hosts for total of
536,870,912 (299) unique IP addresses. Class C networks have a first bit value of 1, second bit value
of 1 and a third bit value of 0 in the first octet.
Example
110nnnnn nnnnnnnn nnnnnnnn hhhhhhhh
The first three bits are 110.
The next 21 bits represent the network.
The next 8 bits represent the host.
The initial bytes can be from 192 – 223.
Total addresses in Class C are 2,097,152.
254 hosts on each Class C.
Class D
The class D is used for multicasts. Multicasting is used to pass the copies of datagram to a
selected group of hosts instead of individual host. Class D is slightly different from the first three
classes. It has a fires bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of
0. The other 28 bits are used to identify the group of computers where the multicast message will be
passed.
Example
1110mmmm mmmmmmmm mmmmmmmm mmmmmmmm
The first four bits are 1110.
The next 28 bits are for multicast address.
The initial bytes can be from 224 – 247.
Class E
The class E is used for experimental purposes only. It is also different from fires three.
Classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of
1. The other 28 bits are used to identify the group of computers where the multicast message will be
passed.
The messages that are intended for all computers on a network are sent as broadcasts. These
messages always use the IP address 255.255.255.255.
Example
47
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
IPv6 Addressing
IPv4 is the current TCP/IP addressing technique used on the Internet. The address space for
IPv4 is quickly running out due to the rapid growth of the Internet. IPv6 was introduced as a
solution for expanding the possible number of users on the Internet. It is also called Iping or the
next generation IP.
IPv6 uses 128-bit address technique as compared to IPv4’s 32-bit address structure. It
provides a large number of IP addresses (2128) IPv6 numbers are written in hexadecimal rather than
dotted decimal. An example of a 32-hexadecimal digit IPv6 address is as follows:
6789: ABCD: 1234: EF98: 7654: 321F: EDCB: AF21
The important changes from IPv4 to IPv6 are as follows:
Expanded Address Space The current internet addresses are 32 bits long. It limits the number of
unique addresses to approximately 4 billion. Some addresses are
reserved such as broadcast addresses and some addresses in a class
may not be used. IPv6 increases the size of address field to 128 bits. It
allows up to 3 x 1038 addresses.
Quality of Service (QOS) IPv6 will institute service categories to prioritize the flow of data to
accommodate time-sensitive transmissions such as audio and video.
The real-time transmissions will be provided with improved
performance. The priority designations include the classifications such
as follows:
Uncharacterized traffic.
Filler traffic such as net news.
Unattended data transfer such as e-mail.
Bulk transfer such as file transfers.
Interactive transfers.
Real time transfer.
IP Header Changes The format of IP header will change to provide larger address space and
quality of service. The header fields that are currently not used will be
dropped. The header extensions are allowed to provide variable-length
headers. The extension headers can provide functions such as security,
integrity, destination-specific information and routing control.
Security & Privacy change IPv6 will allow extensions to the header for secure transmissions.
The extensions will provide many authentication algorithms to
detect and eliminate security problems.
48
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Interoperability with IPv4 The new version will be backward compatible with the current
version. The implementation of IPv6 may be accomplished
incrementally to allow the nodes to be upgraded to the new
version.
Types of IPv6 addresses
Different types of IPv6 addresses are as follows:
Unicast The unicast IPv6 address is used to identify single network interface address. Data
packets are sent directly to the computer wit specified IPv6 address.
Multicast IPv6 addresses are defined for a group of networking devices. Data packets sent
to a multicast address are sent to the entire group of networking devices such as a
group of routers running the same routing protocol. Multicast addresses start with
the prefix FF00::/8. The next group of characters in the IPv6 multicast address are
called the scope. The scope bits are used to identify which ISP should carry the
data traffic.
Anycast The anycast IPv6 address is obtained from a list of addresses but is only delivered
to the nearest node.
Bursty Data
In telecommunication, a burst transmission or data burst is the broadcast of a relatively high-
bandwidth transmission over a short period. It can also occur in a computer network
where data transmission is interrupted at intervals.
Baud Rate
In telecommunication and electronics, baud is a common measure of symbol rate, one of the
components that determine the speed of communication over a data channel. It is the unit for
symbol rate or modulation rate in symbols per second or pulses per second.
Peak Data Rate
Peak data rate is the fastest data transfer rate for a device, typically available in short bursts
during transfer activity, and not sustainable for long periods of time.
Active Hubs
A central connecting device in a network that regenerates signals on the output side to keep the
signal strong and also called a "multiport repeater." Contrast with passive hub and
intelligent hub.
Passive Hub
A central connecting device in a network that joins wires from several stations in a star
configuration. It does not provide any processing or regeneration of signals. Contrast with
active hub and intelligent hub.
BNC Connector
49
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
50
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Theory Server
Active Directory:
Active Directory is a centralized and standardized system that automates network management
of user data, security, and distributed resources, and enables interoperation with other directories.
Active Directory is designed especially for distributed networking environments.
Groups
51
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Groups are used to collect user accounts, computer accounts, and other groups into manageable
units. Working with groups instead of with individual users helps simplify network maintenance
and administration.
Groups Type
• Security Group
Use to assign or deny rights and permissions.
• Distributed Group
Distribution groups can be used only with email applications (such as Exchange Server) to send
email to collections of users. Distribution groups are not security enabled, which means that
they cannot be listed in discretionary access control lists (DACLs).
Users
Active Directory contains only objects. Users, groups, and computers, however, are often called
accounts instead of objects.
User Accounts
A user requires an Active Directory user account to log on to a computer or to a domain. The
account establishes an identity for the user; the operating system then uses this identity to
authenticate the user and to grant him or her authorization to access specific domain resources.
User accounts can also be used as service accounts for some applications.
Computer Accounts
Like user accounts, computer accounts provide a means for authenticating and auditing the
computer's access to the network and its access to domain resources
We have to join a computer to our domain so the user can login with their AD account.
When a computer joined AD domain its account been created in Domain for authentication.
domain name server, also called a DNS server or name server, which manages a massive
database that maps domain names to IP addresses.
DHCP Scopes
Before your DHCP server can provide IP address leases to clients, however, a range of IP
addresses must be defined at the DHCP server. This range, known as a scope.
Defines a single physical subnet on your network to which DHCP services are offered. So, for
example, if you have two subnets, your DHCP server must be connected to each subnet and you
must define a scope for each subnet. Scopes also provide the primary way for the server to
manage distribution and assignment of IP addresses and any related configuration parameters to
clients on the network.
Group policy
53
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Definition Backup
54
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Backup refers to the process of making copies of data or data files to use in the event the original data or
data files are lost or destroyed.
OR
A copy of a file or other item of data made in case the original is lost or damaged.
Print Server (PSERVER)
A print server is a computer that can process print-related jobs on a network of computers. Print
servers are connected to a computer network in order to serve the need for printing jobs in a
network that may contain more than one printer. A print server usually allows users in a
computer network to perform a printing job without having to move files to the computer
connected directly to the printer. It is also known as printer server or network printer, (although
the latter is actually one of the properties of the print server).
Windows Deployment Services
Windows Deployment Services is a server role that gives administrators the ability to deploy Windows
operating systems remotely.
WDS can be used for network-based installations to set up new computers so administrators do not have
to directly install each operating system (OS).
Hyper-V
Microsoft's virtual machine capability. Introduced in Windows Server 2008, it enables multiple instances
of Windows, Linux and other operating systems to run simultaneously. It uses the Para virtualization
method, which requires the operating system be modified to run as a virtual machine.
Disk Defragmentation
Defragmentation is the process of locating the noncontiguous fragments of data into which a
computer file may be divided as it is stored on a hard disk, and rearranging the fragments and
55
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
restoring them into fewer fragments or into the whole file. ... Windows XP comes with a utility
called "Disk Defragmenter."
Subnet Mask
A subnet mask is a number that defines a range of IP addresses that can be used in a network. ...
A subnet mask hides, or "masks," the network part of a system's IP address and leaves only the
host part as the machine identifier. A common subnet mask for a Class C IP address is
255.255.255.0.
Memory Quota
A resource quota, defined by a Resource Quota object, provides constraints that limit aggregate
resource consumption per project. It can limit the quantity of objects that can be created in a
project by type, as well as the total amount of compute resources and storage that may be
consumed by resources in that project.
56
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
57
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
58
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
59
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
60
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Next.
8. Select Server with a GUI& Click On Next Button.
1.
61
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
62
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
63
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
64
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
65
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
66
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
67
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Change
68
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select OK
69
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Close
70
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Restart Now
Open Ethernet
Select Ethernet
71
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
72
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
75
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
76
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
77
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
When you click on restart option then windows show a dialogue box add roles and features
wizard select here Yes
78
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
79
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
80
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Deployment configuration: Select add a new forest and then type name
81
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
83
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
84
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
85
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
86
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
87
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Tools
89
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
90
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
For making User Click on Organization Unit, then Click on Empty Space.
92
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Type User Name Then Type User Logon Name Then Select OK
93
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
94
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
95
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
96
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
97
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
98
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
99
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
100
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
101
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
102
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
103
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
104
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
105
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Add Features
106
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
110
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Authorization: Commit
111
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
112
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
How much Range do you want to add write here. Assign Start IP Address & End IP Address.
115
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
116
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
117
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Lease Duration: How much time do you want to give IP write here then Next
Configuration DHCP Option: Select Yes I want to configure these option now
Then Select Next
118
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Router (Default Gateway): If you attached with Router then give the IP of Router then select Next
Domain Name and DNS Server: If your Present Domain Name show here then select Next
Select Next
If Ipv4 has green Symbol you must Active it then, select Finish
120
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
121
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
If you want to see which IP Assign DHCP to the system, then Double Click on it (scope)
DNS must give in DHCP. For this Click on Scope Option, then Option Name,
then 025 DNS Domain Name, then OK
123
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Tools
Extend Forest
Extend Domains
125
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
126
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Group Policy Management and Right Click then Select New
How much Range do you want to add, write here /Assign Start IP Address &End IP Address.
127
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
128
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Extend Policies
Extend Administrative Templates: Policy definition (ADMX files) Retrieved from the local
computer.
130
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select System
131
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
132
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Apply it then OK
Drag the policy which you implement and Drop on your Domain
133
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
After drop it the Dialogue Box of Policy Management will open, then OK
Press Windows +R
135
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
IF you want to Open Group Policy management through Command Then Press Windows
+R
137
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
138
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
139
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Note: If you Apply different Policies in One OU and you want only Some Policies are
implement and some are not. For this purpose we Right Click on that OU and Click on
Block Inheritance
140
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Note:
a) When you Remove Server Features and Remove Clients, firstly your Client must be on
Workgroup. If Client is not on workgroup it would be create problem.
b) When Install New Window firstly set the Password of Local Administrator.
c)
Method of Password Setting
First go on Client’s Computer then Right Click.
Then Click on Manage.
Then Click on User. Then Right Click on User.
Right Click on Administrator.
Now, Click on set Password.
After Setting of Password go to properties.
Check on Never Expire Password.
Uncheck on Disable.
System:
Don’t run specified windows app.
Run only specified windows app.
2. User Configuration > Policies > Administrative Templates > Desktop
See all Policies of Desktop.
3. User Configuration > Policies > Administrative Templates > Start Menu
and Taskbar
See all policies of star menu and taskbar.
4. User Configuration > Policies > Administrative Templates > Start Menu
and Taskbar
Block clock:
5. User Configuration > Policies > Administrative Templates > Start Menu
and Taskbar
ADD Wallpaper:
6. User Configuration > Policies > Administrative Templates > Desktop >
Desktop
Run Application:
7. User Configuration > Policies > Administrative Templates > System >
Logon
142
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Deployment configuration: Select Add a Domain Controller to an existing Domain and Type Domain Name
143
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
144
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
145
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Domain Controller Option: Allow domain controller reinstall then give password and confirm password
146
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
147
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
148
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
150
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
151
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Server Roles: Extend File and iSCSI Services and Mark File Server Resource Manager
Server Roles: Now File Server Resource Manager Marked Select Next
153
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Confirmation: When You Mark on the Restart Option Then Window show
You, a Dialogue box now Select Next
154
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
155
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Tools
156
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
158
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
159
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
161
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Create Quota on Path then Select Limit and Browse Folder
163
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Tools
164
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
165
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
166
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Create File Group Properties: File Group Name then Add Files To Include and
Files to exclude Names then OK
Now I Give the Name: Windows Backup File to Include and Exclude Name
167
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
168
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
How To Create File Screens: Select File Screens for Block some files. So, that users can’t store these
files
Select File Screens Folder or Any Folder on which you want to Apply Select this then Ok
Folder Is Selected. Now, on which File do you want to Apply Select this Then Create?
170
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
171
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
172
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
173
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
174
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
175
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
176
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Tools
177
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
178
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
179
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
180
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
181
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Item: Select Anyone Folder which you want to make Backup
182
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Select Items for Backup: Now Folder Is Selected Then Select Next
183
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Confirmation: Now, Partition and Folder that you made Backup Show. Then Select and Finish
185
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
186
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
187
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
2 – Next, In the Add Roles and Features Wizard box, click Next.
3 – On the Select installation type page, verify that you choose Role-Based
or feature-based installation then click Next.
188
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
189
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
190
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
7 – On the WDS box, review the information presented, and then proceed
with Next.
191
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
192
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
193
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
194
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
14 – On the Install Options page, verify that you choose Integrated with
Active Directory and then click Next.
15 – On the Remote Installation Folder Location page, you can accept the
default location which is C:\RemoteInstall and then click Next.
195
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
17 – Next, on the PXE Server Initial Settings box, click Respond to all
client computers (known and unknown), and then click Next, please wait
for few second for the process to complete.
196
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
18 – Next, on the Operation Complete box, please clear the Add images to
the server now check box, and then click Finish.
20 – Our next step is to add a boot image into WDS console, so in Windows
Deployment Services console, double click DC-CLOUD.Windows.ae and
then right-click Boot Images, and then click Add Boot Image.
197
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
21 – On the Add Image Wizard, on the Image File page, click Browse, then
in Select Windows Image File box, double-click DVD Drive (D:), double-
click sources folder, and then double-click boot.wim.
198
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
199
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
26 – Once you successfully completed add a boot image into WDS, next you
need to add an install image into WDS, so in the WDS console, right-click
Install Images, and then click Add Image Group.
200
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Now we have to select and add the Install image. Install images are the
operating system images that you deploy to the client computer. Click
on Browse and the select Install.wim. Click on Open.
201
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
In the below screenshot we will select all the editions of windows 7 that are
listed. click on Next
202
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Lets configure the WDS server properties now. Launch the Windows
Deployment Services Console, right click the WDS server and click
on Properties. Click on Boot and make sure Require the user to press the
F12 key to continue the PXE boot is selected for known and unknown
clients.
Click on PXE Response and make sure that Respond to all client
computers (known and unknown) is selected. Click on Apply and Okay.
203
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
204
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Folder Lock
windows Firewall 2-key
Advance Setting Program
Inboun Rule Browser
New Rule Location
Kegen Block
Next
C:Program fileNew soft Folder Lock Flash Formate in CMD
1. Diskbar 5. Select partition 1
2. Select disk 6. Active
3. Clean 7. Format fs=ntfs
4. Create partition primary 8. Complete process.
205
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
206
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
Papers Bank
Computer Hardware Test
1. A device that generates the periodic signals used to control the timing of all CPU operations.
15. The contents of these chips are lost when the computer is switched off?
7. Define IP Address?
208
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
26. Which device is used to connect two different LAN’S with each other?
27. Which device is used in bus topology to connect client with each other?
Paper Network
1. Assembling and dissembling the computer hardware,
2. Configure Network between Two computers.
3. Connect any two computers with a common printer.
Network Paper
1) Install any latest Antivirus in your Pc.
2) Install/Configure NTFS Permissions.
3) Install Windows Server 2008 in your Pc.
4) Do the configuration of assigning IPS to Client through DHCP.
5) Install a Network printer.
6) Verify Physical Connection between Computers.
209
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
210
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
211
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
PRACTICAL – 1
(a) Assemble Motherboard (Data Cables, Sockets, Ports), Storage devices (CD/DVD)
and CARD (NIC).
(b) Install 32/64 bit window 7 in your PC.
(c) Preparing partitions and volumne.
(d) Install Scanner in your PC.
212
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
PRACTICAL - 2
Practical
Install antivirus
Install NTFS
Install server 2008 in your pc configure of assigning IP’s to client through DHCP
Network printer and take a test print
Physical connection between computers
Theory
What is DNS?
What is data?
OSI model layers name?
Types of network name?
UAC abbreviation
Modem abbreviation
213
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
215
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
216
Computer Network & Technician
Teacher : Miss Zohra Tabassum Prepared By : Amir & Zeeshan Ail
217
Computer Network & Technician