0% found this document useful (0 votes)
72 views

Namnesh Network+

Uploaded by

Chirag Gujral
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Namnesh Network+

Uploaded by

Chirag Gujral
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 262

BEGINNER TO EXPERT GUARANTEED

CompTIA Network+ COURSE

BY:-NAMNESH
CompTIA
Network+ 11. TCP & UDP with Protocols & Ports
Syllabus 12. IP Address Fully Explained
13. Subnetting Fully Explained
• CompTIA N+ Scope, Salary & Certification
• What is Network & Networking 14. Networking Services (DNS, DHCP like)
• Types of Networks Explained
• Types of Topologies in Network
15. Routing Protocols Explained
• Types of Networking Devices 16. WAN Technology Fully Explained
• Types of Connectors, Ports & Wires
• Wireless, Wires & Cables Standard 17. Remote Protocols & Services
• Threats & Shields of a Network
18. Networking Tools & Safety
• OSI Model Fully Explained
• TCP/IP Model Fully Explained 19. Network Threats & Attacks
20. All about Network Security
CompTIA
Network+
Syllabus

•21. All About Cloud Concepts


•22. All About IoT Concepts
•23. Configuring a Switch (All Knowledge)
•24. VLAN explained
•25. User authentication
•26. Network Policies
•27. Everything about Virtualization
•28. Everything about SOHO
•29. Networking Tools & Safety
•30. Networking Issues & Troubleshooting
CompTIA
N+ Scope,
Salary &
Certificati
on
What Is
•CompTIA Network+ is the only industry certification that
covers both wired and wireless networks.
•CompTIA’s Network+ validates the knowledge and skills
needed to troubleshoot, configure and manage wired and

CompTIA
wireless networks found in companies around the world.
CompTIA Network+ certifies a professional-level understanding
of emerging technologies, including cloud and virtualization
technologies.

Network+ •The certifications offered by CompTIA, such as A+, Network+,


and Security+, cover most aspects of IT and prove to employers
that you have the background to be considered for an IT job.

Certificati
•It also sets you up for success with Cisco’s Cisco Certified
Network Associate (CCNA) certification training, Juniper’s
Juniper Networks Certified Associate – Junos (JNCA-Junos)
certification, and more. You will have to take an exam that will
have up to 90 questions and get a minimum score of 720 out of

on?
900. The certification exam must be completed in 90 minutes. It
will consist of a mix of performance-based (simulations) and
multiple-choice questions. The exam is challenging but not so
difficult that it can’t be attained by most people.
CompTIA A+
Certification jobs
•CompTIA Network+ is for professionals
with the recommended prerequisite of
Network administrator CompTIA Network+ certification and nine
months of networking experience looking
Network field technician develop their networking careers. CompTIA
Network+ prepares candidates for the
Junior network administrator following job roles:
IT consultant
Network field engineer
Computer technician
Help desk technician
System engineer
Network support specialist
Network analyst
Why • Better Future Ahead

this •

Great Opportunities
Demanding Skill

Course
• Network Admininstrator
• First Step to Security
• Medium Salary Packages

?
Best book to
self-study for
the Network+
exam?
2. What is Network
& Networking
What is Network ?
•  A network consists of two or more computers
that are linked in order to share resources (such as
printers and CDs), exchange files, or allow
electronic communications.

•  The computers on a network may be


linked through cables, telephone lines,
radio waves, satellites, or infrared light
beams.
What is Networking ?
•Networking, also known as computer networking, is
the practice of transporting and exchanging data
between nodes over a shared medium in an
information system. Networking comprises not only
the design, construction and use of a network, but
also the management, maintenance and operation of
the network infrastructure, software and policies.
•Peer to Peer Model
Client-Server Model
3. Network
with there
types
Basic Types of
Networks
• Local Area Network (LAN)
• Personal Area Network (PAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
• Campus Area Network (CAN)
Local Area
Network (LAN)
 A LAN is a network that is used for
communicating among computer devices,
usually within an office building or home.
 LAN’s enable the sharing of resources
such as files or hardware devices that may
be needed by multiple users • • Is limited in
size, typically spanning a few hundred
meters, and no more than a mile
 Is fast, with speeds from 10 Mbps to 10
Gbps
 Requires little wiring, typically a single
cable connecting to each device
 Has lower cost compared to MAN’s or
WAN’s
Personal Area Network
(PAN)
•  A PAN is a network that is used for
communicating among computer devices, usually
home.
•  PAN’s enable the sharing of resources such
as files or hardware devices that may be
needed by multiple users • • Is limited in size,
typically spanning a few hundred meters
•  Is fast, with speeds from 10 Mbps to 10
Gbps
•  Requires little wiring, typically a single
cable connecting to each device
• Has lower cost compared to MAN’s or WAN’s
•  LAN’s can be either wired or wireless. Twisted
pair, coax or fibre optic cable can be used in wired
LAN’s.
Campus Area
Network (CAN)
• A campus area network (CAN) is a
network of multiple interconnected
local area networks (LAN) in a limited
geographical area. A CAN is smaller
than a wide area network (WAN) or
metropolitan area network (MAN).

• A CAN is also known as a corporate


area network (CAN).

• CAN benefits are as follows:

• Cost-effective
• Wireless, versus cable
• Multidepartment network access
Metropolitan
Area Network
(MAN)
•  A metropolitan area network (MAN) is a large computer network that
usually spans a city or a large campus.
• A MAN is optimized for a larger geographical area than a LAN,
ranging
• from several blocks of buildings to entire cities.
•  A MAN might be owned and operated by a single organization, but it
usually will be used by many individuals and organizations.
• A MAN often acts as a high speed network to allow sharing of
regional
• resources.
• A MAN typically covers an area of between 5 and 50 km
diameter.
• Examples of MAN: Telephone company network that provides a
high
• speed DSL to customers and cable TV network.
Wide Area
Network
(WAN)
 WAN covers a large geographic area such as country, continent or
even whole of the world.
 A WAN is two or more LANs connected together. The LANs can
be many miles apart.
 To cover great distances, WANs may transmit data over leased
high-speed phone lines or wireless links such as satellites.
 Multiple LANs can be connected together using devices such as
bridges, routers, or gateways, which enable them to share data.
 The world's most popular WAN is the Internet.
4. Types of
Topologies
in Network
Topology
• Topology refers to the layout of connected devices on a network.
• Here, some logical layout of topology.

• Mesh
• Star
• Ring
• Line
• Bus
• Tree
• Hybrid
Network Topology
• Here every device has a point to point link to
every other device.

Advantages:
• They use dedicated links so each
link can only carry its own data

Mesh load. So traffic problem can be


avoided.

Topology
• It is robust. If any one link get
damaged it cannot affect others.

 It gives privacy and security.

• Fault identification and fault


isolation are easy.
Mesh Topology
• Here each device has a dedicated
point-to-point link to the central
controller called “Hub”(Act as a
Exchange).
• There is no direct traffic between
devices.
• The transmission are
Star occurred only through the
central “hub”.
Topology • When device 1 wants to send data
to device 2; First sends the data to
hub. Which then relays the data to
the other connected device.
Star Topology
Bus Topology
A bus topology is multipoint.

Here one long cable act as a backbone to link all the devices
are connected to the backbone by drop lines and taps.

Drop line- is the connection b/w the devices and the cable.

Tap- is the splitter that cut the main link.


• This allows only one device to transmit at a time.
Bus Topology
• Here each device has a dedicated
connection with two devices on either
side.
• The signal is passed in one direction
from device to device until it reaches
the destination and each device have
repeater.
Ring Topology • When one device received signals
instead of intended another device,
its repeater then regenerates the data
and passes them along.
• To add or delete a device requires
changing only two connections.
Ring Topology
• Alternatively referred to as a star bus topology.

• Tree topology is one of the most common


network setups that is similar to a bus topology
and a star topology.

• A tree topology connects multiple star networks


to other star networks. Below is a visual
Tree Topology example of a simple computer setup on a
network using the star topology.
Tree Topology
Hybrid Topology
• A network which contain all type
of physical structure and
connected under a single
backbone channel.
Considerations for
choosing topology
• Money- Bus n/w may be the least
expensive way to install a n/w.

• Length- of cable needed- the


linear bus n/w uses shorter
lengths of cable.

• Future growth- with star topology,


expending is easily done by adding another

• Cable type- most common used cable in


commercial organization is twisted pair.
Which often used with star topologies.
5. Types of
Networkin
g Devices
• To connect LANs, connecting devices are
needed and various connecting devices are
Introduction such as bridge, switch, router, hub, repeater.
• Types of Networking Devices :-

1. NIC Card
2. Repeater
3. Hub
4. Bridge
5. Switch
6. Gateway
7. Router
8. Modem
•It stands for Network Interface
Controller. NIC used to connect the
NIC or ethernet cable (RJ-45 Connector)
with the PC. It is a Card which have
Network Mac Address written on it.
Card •Components of NIC :-

• Metal Expansion Card


• Boot ROM Chip
• 32 bit PCI Controller
• Activity LED
• RJ-45 LAN Port
A NIC connecting a LAN
Repea
ters
•Repeater used to regenerate or replicate
a signal. It removes the unwanted noise in
an incoming signal, it works on Layer 1 of
OSI Model

It is used in some scaled


area, and it refine the
signals and manage the
proper speed of the
network
Repeater connecting two segments of a
LAN
HUB
It is a Networking Device which simply receive data from one port and transfer on all the other ports. HUBs are
commonly used to connect segments of LAN. Hub Works on Physical layer of OSI Moodel

It used in where you have to


create multiple ethernet with
the help of a nnetworking
device. It comes with
different port segment like
6,12 & 24
A HUB connecting LAN
Brid
ge
Bridge Devices inspect incoming network traffic and determine whether to forward or discard it according to its
intended destination it operates on data link layer

A bridge is a type of computer


network device that provides
interconnection with
other bridge networks that use the
same protocol.
A bridge connecting two LANs

A bridge does not change the physical (MAC) addresses in a frame.


Function of
Bridge
Swit
ch
A Switch can recieve input or signal from any of one port and transmit it on all the ports. Ethernet LAN is used to
connect to a switch that correct system. It works on Data link layer of OSI Model

It is a small device that transfers


data packets between multiple
network devices such as
computers, routers, servers or
other switches
A switch
connecting a
LAN
Gate
way
Gateway Connects two networks together with the help of gateway devices like firewire & router. It is a node
between the public network and private network which makes some security with the help of identification

A gateway is a networking device


that connects two networks using
different protocols together. it also
acts as a “gate” between two
networks.
A Gateway
connecting a
LAN
Route
r
Router is a networking device which is used to provide interaction between two different networks. Router are
also used for provide the routes to the data and devices that are connected in network. Router are used to
establish internetwork communication

A router inspects a given data


packet's destination Internet
Protocol address (IP address), and
provide connection to the nodes
with the main network. It gives you
wired and wireless both
connectivities.
A Router
connecting a
LAN
MODEM
”Modulator-Demodulator” A modem or broadband modem is a hardware device that connects a computer or
router to a broadband network. It converts or "modulates" an analog signal from a telephone or cable wire to
digital data (1s and 0s) that a computer can recognize.

The main difference between the


two devices is that a modem lets
you connect to the internet, while
a router distributes that
connection to different devices.
A modem is your gateway to the
web, while a router is a central hub
for your devices.
A Modem connecting a LAN
6. Types of
Connector
s, Ports &
Wires
What is
Tranmission
Media ?

•In data communication,

• Transmission media is a
pathway that carries the information
from sender to receiver.

• We use different types of


cables or waves to
transmit data.

• Data is transmitted
normally through
electrical or
• electromagnetic signals.
Description
• Transmission media are located below the physical layer

• Computers use signals to represent data.

• Signals are transmitted in form of electromagnetic energy.


Classification of Transmission media
Twisted-
pair cable
 A twisted pair consists of two conductors

 Basically copper based

 With its own plastic insulation, twisted


together.
Twisted Pair Description
• One wire use to carry signals to the receiver

• Second wire used as a ground reference

• Very common medium

• Can be use in telephone network


Advantages: Disadvantages:
• Connection Within the buildings
• Cheap • Low data rate

• For local area networks (LAN) • Easy to work with• Short range
Twisted Pair
Cables
Twisted Pair cables

Unshielded Shielded
Twisted Pair Twisted pair
(UTP) (STP)
Unshielded
Twiste • Pair of unshielded wires wound
around each other

d Pair • Easiest to install

(UTP): • Telephone subscribers connect to


the central telephone office

• DSL lines

• LAN – 10Mbps or 100Mbps


UTP Cable Types
UTP connector and
Tools

RJ45 (RJ stands for registered jack) is a keyed


connector, it
means that it can be inserted in only one way

Crimping Tool
Advantages of UTP:
 Affordable
 Most compatible cabling
 Major networking system

Disadvantages of UTP:

• Suffers from external Electromagnetic interference


Shielded Twisted
Pair (STP)
• Pair of wires wound around each
other placed inside a protective foil
wrap

• Metal braid or sheath foil that reduces


interference

• Harder to handle (thick, heavy)

• STP is used in IBM token ring


networks.

• Higher transmission rates over


longer distances.
Advantages of  Shielded
STP:  Faster than UTP

Disadvantages of
STP:

 More expensive
than UTP
 High attenuation
rate
What are RJ connectors?
RJ Connectors are a family of push-and-click connectors for twisted-pair wiring in telephone
and network wiring. RJ stands for Registered Jack. RJ types define both a jack or receptacle
(female) and a plug (male) type of connector.
The most common types of RJ connectors are as follows:

RJ-11 connector: A 4-wire or 6-wire telephone-type connector

RJ-45 connector: An 8-wire telephone-type connector

RJ-48 connector: An 8-wire telephone-type connector TP


Co-axial Cable
Co-axial cable carries signal of higher frequency ranges than twisted
pair cable

• Inner conductor is a solid wire

• Outer conductor serves as a shield against noise and a


second conductor
Categories of
coaxial cables

Coaxial cables are categorized by Radio Government


(RG) ratings, RG is De Jure standards
Coaxial Cable
Connectors
BNC Connectors – Bayone Neil Concelman
To connect coaxial cable to devices we need coaxial connectors

 BNC Connector is used at the end of the cable to a device


Example: TV set conenction

 BNC T connector used to Ethernet networks to branch out connection


to computer or other devices

 BNC terminator is used at the end of the cable to prevent the reflection
of the signal
Coaxial Cable
Applications
• Most versatile medium

• Television distribution

• Long distance telephone transmission

• Can carry 10,000 voice calls simultaneously

• Short distance computer systems links


ADVANTAGES
• Local area networks  Easy to wire

 Easy to expand

DISADVANTAGE

 Single cable failure can take


down an entire network
Fiber-Optic
Cable
A fiber optic cable is made of glass or plastic
and transmit signals in the form of light.

Nature of light:

 Light travels in a straight line

 If light goes from one substance to another then the


ray of light changes direction

 Ray of light changes direction when goes from more


dense to a less dence substance
Fiber – Optic cable Connectors

Subscriber Channel (SC)


Connecter

Straight-Tip (ST)
Connecter
Areas of
Applicati
 Telecommunications on
 Local Area Networks

 Cable TV

 CCTV

Advantage Disadvantage
 Greater capacity Example: Data rates at
• Installation and maintenance are
100 Gbps
Expensive
 Smaller size & light weight
• Only Unidirectional light propagation
 Lower attenuation
7. Wireless, Wires
& Cables Standard
Wireless transmission waves

Unguided
Media
Unguided Media
– Radio Waves
 Omnidirectional Antenna
 Frequencies between 3
KHz and 1 GHz.
 Used for
multicasts(multiple way)
communications, such as
radio and television, and
paging system.
 Radio waves can penetrate
buildings easily, so that
widely use for indoors &
outdoors communication.
Microwaves

Microwaves are ideal


when large areas need
to be covered and
there are no obstacles
in the path
Micro waves
Transmission

• Microwaves are unidirectional

• Microwaves electromagnetic waves having


frequency between 1 GHZ and 300 GHZ.

• There are two types of microwaves data


communication system
: terrestrial and satellite

• Microwaves are widely used for one-to-one


communication between sender and receiver,
example: satellite, GPS
 Frequencies between 3.00 GHz to 400 THz.
Infrared
 Used for short-range communication
 Example: Night Vision Camera,Remote control, File sharing between two
phones, Communication between a PC and peripheral device
Wi-Fi &
Bluetooth
Wi-
Fi

 What is Wi-Fi
 Short for “Wireless Fidelity”
 A trademark of the Wi-Fi Alliance
 The brand name for products using the IEEE 802.11 family of
standards
 Commonly used for “wireless local area network” (WLAN)
Bluetooth
 Wireless Personal Area Networks (WPAN)
 Design goal
 Cable replacement
 Low cost
 Low power
 Small size
 For mobile devices
 Standard: IEEE 802.15.1
•Wireless
Standards
Cellular
Standard
s
IEEE
Wifi Standards
IEEE
Bluetooth Standards
Wire
Standard
s
8. Network
Vulnerabili
ties
Types of Viruses
• Macro Virus
• Executable Virus
• Backdoor Virus
Macro Viruses
• Most common type of virus on campus Affect Microsoft
Office documents Written in Visual Basic for Applications
• Generally harmless with a few destructive varients

Executable Viruses
• Second most common type of virus on campus
• Written in programming languages and compiled into executable files

Backdoor Programs
Allow anyone on the internet to remotely control the infected computer
– Send and receive files
– View the screen
– Monitor all keystrokes
•Data Security is a process
of protecting files, databases,
and accounts on a network by
adopting a set of controls,
Data applications, and techniques
that identify the relative
Protection importance of different
datasets, their sensitivity,
regulatory compliance
requirements and then
applying appropriate
protections to secure those ..
9. OSI Model
OSI
MODEL
Data, Protocol & Activities
OSI Layers TCP/IP Suit Activities

Application Application To allow access to network resources


Telnet, FTP, SMTP, HTTP, DNS, SNMP, Specific address etc…

To Translate, encrypt, and compress


Presentation Presentation data

Session To establish, manage, and terminate


Session session

Transport To Provide reliable process-to-process


Transport SCTP, TCP, UDP, Sockets and Ports address Message delivery and error recovery

Network To move packets from source to


Network IP, ARP/RARP, ICMP, IGMP, Logical address destination; to provide internetworking

Data Link To organize bits into frames; to provide


Data Link IEEE 802 Standards, FDDI, PPP, Physical address Hop-to-hop delivery

Physical To Transmit bits over a medium; to provide


Physical Medium, Coax, Fiber, 10base, Wireless Mechanical and electrical specifications
Physical
Layer From data link layer To data link layer

110 10101000000010111 110 10101000000010111 Physical layer


Physical layer

Transmission medium

 One of the major function of the physical layer is to move data in the form of electromagnetic
signals across a transmission medium.

Its responsible for movements of individual bits from one hop (Node) to next.

Both data and the signals can be either analog or digital.


Transmission media work by conducting energy along a physical path which
can
 be wired or wireless
Physical characteristics of interface and medium (Transmission medium)

Representation of bits (stream of bits (0s or 1s) with no interpretation and encoded into signals)

Data rate (duration of a bit, which is how long it last)

Synchronization of bits (sender and receivers clock must be

synchronized) Line configuration (Point-to-Point, Point-to-Multipoint)

Physical topology

Transmission mode (Simplex, half duplex, full duplex)
LAYER
From network layer To network layer

Data link layer H2 Data T2 H2 Data T2 Data link layer

To physical layer From physical layer

 Data link layer is responsible for moving frames from one hop (Node) to the next.
 Concerned:
 Framing (stream of bits into manageable data units)
 Physical addressing (MAC Address)
 Flow Control (mechanism for overwhelming the receiver)
 Error Control (trailer, retransmission)
 Access Control (defining master device in the same link)
Network Layer
From transport layer To transport layer

Network layer H3 Data Packet H3 Data Packet Network layer

To data link layer From data link layer

 The network layer is responsible for the delivery of individual packets from the source
host to the destination host.
 Concerned:
 Logical addressing (IP Address)
 Routing (Source to destination transmission between networks)
TRANSPORT
LAYER
From session layer From session layer

Transport layer H4 Data H4 Data H4 Data H4 Data H4 Data H4 Data Transport layer

Segments Segments

To network layer From network layer


 The transport layer is responsible for the delivery of a message from one process to
another
 Concerned:
 Service-point addressing (Port address)
 Segmentation and reassembly (Sequence
 number)
 Connection control (Connectionless or connection
 oriented) Flow control (end to end)
Error Control (Process to Process)
SESSION
Layer
From Presentation layer To Presentation layer

H5 Data Data Data H5 Data Data Data Session layer


Session layer
Syn Syn Syn Syn Syn Syn

To transport layer From transport layer

 The session layer is responsible for dialog control and synchronization


 Concerned:
 Dialog Control (Half Duplex/Full duplex)
 Synchronization (Synchronization points, process inline within same
page)
PRESENTATION
Layer
From application layer To application layer

presentation layer H6 Data H6 Data presentation layer

To session layer From session layer

 The presentation layer is responsible for translation, compression and encryption


 Concerned:
 Translation (interoperability between different encoding system)
 Encryption (Privacy schemes)
 Compression (data compression)
LAYER
USER USER
(Human or Program)
(Human or Program)

X.500 FTAM X.400 X.500 FTAM X.400

Application layer
Application layer
H7 Data Message H7 Data Message

To presentation layer From presentation layer

 The application layer is responsible for providing services to the user.


 Concerned:
 Network virtual terminal (Software)
 File transfer, access and management
 Mail services
 Directory services (access to distributed database sources for global information about various
objects and services)
10. TCP/IP
Model
• The TCP/IP model was developed prior to the OSI model.

• The TCP/IP model is not exactly similar to the OSI model.

• The TCP/IP model consists of five layers: the application


layer, transport layer, network layer, data link layer and
physical layer.

TCP/IP • The first four layers provide physical standards, network

model interface, internetworking, and transport functions that


correspond to the first four layers of the OSI model and
these four layers are represented in TCP/IP model by a
single layer called the application layer.

• TCP/IP is a hierarchical protocol made up of interactive


modules, and each of them provides specific functionality.
Model
Network Interface Layer
This layer corresponds to the combination of Data Link Layer and
Physical Layer of the OSI model. It looks out for hardware addressing
and the protocols present in this layer allows for the physical
transmission of data.
We just talked about ARP being a protocol of Internet layer, but there
is a conflict about declaring it as a protocol of Internet Layer or
Network access layer. It is described as residing in layer 3, being
encapsulated by layer 2 protocols.
Network Layer
This layer parallels the functions of OSI’s Network layer. It
defines the protocols which are responsible for logical
transmission of data over the entire network. The main
protocols residing at this layer are :

IP
ICMP
ARP
Transport Layer

This layer is analogous to the transport layer of the OSI model. It is


responsible for end-to-end communication and error-free delivery
of data. It shields the upper-layer applications from the
complexities of data. The two main protocols present in this layer
are :

1.Transmission Control Protocol (TCP)


2.User Datagram Protocol (UDP)
Application Layer
This layer performs the functions of top three layers of the OSI model:
Application, Presentation and Session Layer. It is responsible for node-
to-node communication and controls user-interface specifications.
Some of the protocols present in this layer are: HTTP, HTTPS, FTP,
TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD.
Have a look at Protocols in Application Layer for some information
about these protocols.

HTTP and HTTPS


SSH
NTP
•ARP (Address Resolution Protocol) – used to associate an IP address with a MAC address.

•IP (Internet Protocol) – used to deliver packets from the source host to the destination host
based on the IP addresses.

•ICMP (Internet Control Message Protocol) – used to detects and reports network error
conditions. Used in ping.

•TCP (Transmission Control Protocol) – a connection-oriented protocol that enables reliable


data transfer between two computers.

•UDP (User Datagram Protocol) – a connectionless protocol for data transfer. Since a session is
not created before the data transfer, there is no guarantee of data delivery.

•FTP (File Transfer Protocol) – used for file transfers from one host to another.

•Telnet (Telecommunications Network) – used to connect and issue commands on a remote


computer.

•DNS (Domain Name System) – used for host names to the IP address resolution.

•HTTP (Hypertext Transfer Protocol) – used to transfer files (text, graphic images, sound,
video, and other multimedia files) on the World Wide Web.
11. TCP & UDP
with Protocols
& Ports
Let’s Explore Protocols & Ports of TCP & UDP
12. IP
Address
Fully
Explained
What is IP Address?

An Internet Protocol address is a


numerical label assigned to each
device connected to a computer
network that uses the Internet
Protocol for communication. An IP
address serves two main functions:
host or network interface identification
and location addressing.
IP Addressing IPv4

AN IP ADDRESS BASICALLY A 32-BIT INTRODUCED BY IANA (INTERNET 32 BIT IS DIVIDED INTO 4 EQUAL PARTS EACH 8 BIT GROUP IS KNOWN BY OCTET.
ADDRESS THAT UNIQUELY UNIVERSALLY ASSIGNED NUMBERS AUTHORITY). OF 8-8 BITS SEPARATED BY DOTTED
DEFINES CONNECTION OF HOST OR A DECIMAL NOTATION. IT IS IN THE RANGE
ROUTER TO THE INTERNET. IP ADDRESS IS OF MINIMUM 0.0.0.0 TO
UNIQUE. 255.255.255.255.
•IP has five different classes differentiated by
characteristics.

Variou
• Class-A ranges from 0 to 127
• Class-B ranges from 128 to 191
• Class-C ranges from 192 to 223

s IP
• Class-D ranges from 224 to 239
• Class-E ranges from 240 to 255
• First Octet is defining the class of particular

classes
IP e.g. -

128.11.3.31 is follow in class –B


• 127.0.0.0 to 127.255.255.255 is a range of
look back IP.
• Class-A
•This IP ranges from 0 to 126 Decimal value in first

Classes of octet. And 1st octet defines


• network part and remaining three octet defines

IP the Host part. It patterns


•like this NHHH (N-Network; H- Host).
addresses
•First 8bits defines
network and
remaining 24 bits
defines host parts. It
has a highest nos. of
address 231.which
•is about 16,277,216.

•Lie between 10.1.1.1


to 126.255.255.255
• Class B
•This IP ranges from 128 to 191 Decimal value in
first octet. And 1st two bit defines network part
and remaining two octet defines the Host part. It
patterns like this NNHH (N-Network; H-Host).

•First 16 bits defines


network and remaining
16 bits defines host parts.
It has a highest nos. of
address 230.which is
about 65,536.

•IP ranges from


128.16.0.0 to
172.31.255.255.
• Class C
•This IP ranges from 192 to 223 Decimal value in
first octet. And 1st three bit defines network part
and remaining one octet defines the Host part. It
patterns like this NNNH (N-Network; H-Host).

•First 24 bits defines


network and remaining
8 bits defines host
parts. It has a highest
nos. of address
229.which is about
53,68,70,912
•IP ranges from 192.168.0.0 to 223.255.255.0.
• Class-D
•This IP ranges from 224 to 239 Decimal value in
first octet.
•It is not usually use in general applications.
•It is use in Special purpose applications known as
Multicast.
• Class-E
•This IP ranges from 240 to
255 Decimal value in first
octet. It is not usually use in
general applications.
•It is reserved range of IP by R & D (Research and
Development) department. Usually, Class-A to C is
supported by PC and Class-D and E is not
supported.
• An IP address basically a 128-bit
address that uniquely universally
defines connection of host or a
IP router to the Internet. IP address is
unique.
Addr • Introduced by IANA (Internet
Assigned Numbers Authority).
essi • total of 4,294,967,296 unique IP
addresses can be assigned to hosts.
ng • IP is like
2001:db8:1234::f350:2256:f3dd/64
IPv6 • It supports Unicast. Telecast &
Multicast.
• It doesn’t have Classes like ipv4
13.
Subnetting
Fully
Explained
•A subnet mask is a 32- or 128-bit number that
What Is segments an existing IP address in a TCP/IP
network. It is used by the TCP/IP protocol to

Subnet determine whether a host is on the local subnet or


on a remote network. Subnet mask divides the IP
address into a network address and host address,
Mask? hence to identify which part of IP address is
reserved for the network and which part is
available for host use.
IP Addressing
32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


IP Addressing
32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


1 8 9 16 17 24 25 32

Binary 11111111 11111111 11111111 11111111

128

8
4
2
1
64
32
16
128

8
4
2
1
64
32
16
128

8
4
2
1
128

8
4
2
1
64
32
16

64
32
16
IP Addressing
32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


1 8 9 16 17 24 25 32

Binary 11111111 11111111 11111111 11111111

128

8
4
2
1
64
32
16
128

8
4
2
1
64
32
16
128

8
4
2
1
128

8
4
2
1
64
32
16

64
32
16
Example
Decimal 172 16 122 204
Example 10101100 00010000 01111010 11001100
Binary
IP Address Classes

8 bits 8 bits 8 bits 8 bits


Class A: Class B:
Network Host Host Host

Class D: Network Network Host Host


Class C:
Multicast
Network Network Network Host

Class E:
Research
IP Address Classes
Bits: 1 8 9 16 17 24 25 32
NNNNN
NNNNN Host
Host Host
Host Host
Host
Class A:
Range (1-126)

Bits: 1 8 9 16 17 24 25 32
NNNNNN
NNNNNN Network
Network Host
Host Host
Host
Class B:
Range (128-191)
1 8 9 16 17 24 25 32
Bits:
NNNNNN
NNNNNN Network
Network Network
Network Host
Host
Class C:
Range (192-223)
1 8 9 16 17 24 25 32
Bits:
NNNNNN
NNNNNN Multicast
Multicast Group
Group Multicast
Multicast Group
Group Multicast
Multicast Group
Group
Class D:
Range (224-239)
Determining Available Host Addresses
Network Host
172 16 0 0
N

11
9
8
7
6
5
4
3
2
1
16
15
14
13
12
10
10101100 00010000 00000000 00000000 1
00000000 00000001 2
00000000 00000011 3

...

...

...
11111111 11111101 65534
11111111 11111110 65535
11111111 11111111 65536
-
2
2N-2 = 216-2 = 65534 65534
Subnet Mask
Network Host

IP
Address
172 16 0 0
Network Host
Default
Subnet
Mask
255 255 0 0
11111111 11111111 00000000 00000000
Also written as “/16” where 16 represents the number of
1s in the mask.
Network Subnet Host
8-bit
Subnet 255 255 255 0
Mask
Also written as “/24” where 24 represents the number of
1s in the mask.
Subnet Mask without Subnets

Network Host

172.16.2.160 10101100 00010000 00000010 10100000

255.255.0.0 11111111 11111111 00000000 00000000

10101100 00010000 00000000 00000000

Network 172 16 0 0
Number

 Subnets not in use—the default


Subnet Mask with Subnets

Network Subnet Host

172.16.2.160 10101100 00010000 00000010 10100000

255.255.255.0 11111111 11111111 11111111 00000000

10101100 00010000 00000010 00000000

Network
Number 172 16 2 0

 Network number extended by eight


bits
14.
Networking
Services (DNS,
DHCP like)
• Dynamic Host Configuration Protocol
(DHCP)
• From 1993
• An extension of BOOTP, very similar to
DHCP
• Same port numbers as BOOTP
• Extensions:
• Supports temporary allocation
(“leases”) of IP addresses
DHCP • DHCP client can acquire all IP
configuration parameters needed to
operate
• DHCP is the preferred mechanism for
dynamic assignment of IP addresses
• DHCP can interoperate with BOOTP
clients.
• Dynamic assignment of IP
addresses is desirable for several
reasons:
Dynamic • IP addresses are assigned on-
demand
Assignment • Avoid manual IP configuration
of IP • Easy to Configure

addresses
Solutions for dynamic assignment of IP addresses

• Reverse Address Resolution Protocol (RARP)


• Works similar to ARP
• Broadcast a request for the IP address associated with a given MAC address
• RARP server responds with an IP address
• Only assigns IP address (not the default router and subnetmask)

ARP Ethernet MAC


IP address
address
(32 bit)
(48 bit)
RARP
DHCP Interaction
Argon
00:a0:24:71:e4:44 DHCP Server

DHCP Request
00:a0:24:71:e4:44
Sent to 255.255.255.255

Argon
128.143.137.144
00:a0:24:71:e4:44 DHCP Server
DHCP Response:
IP address: 128.143.137.144
Default gateway: 128.143.137.1
Netmask: 255.255.0.0
• BOOTstrap Protocol (BOOTP)
• From 1985
• Host can configure its IP parameters at boot
time.
• 3 services.
• IP address assignment.
• Detection of the IP address for a serving
machine.
• The name of a file to be loaded and

BOOTP executed by the client machine (boot file


name)

• Not only assign IP address, but also default router,


network mask, etc.
• Sent as UDP messages (UDP Port 67 (server) and 68
(host))
• Use limited broadcast address (255.255.255.255):
• These addresses are never forwarded
BOOTP Interaction
(b)
Argon Argon
00:a0:24:71:e4:44 (a) BOOTP Server 128.143.137.144
00:a0:24:71:e4:44 DHCP Server
BOOTP Request BOOTP Response:
00:a0:24:71:e4:44
IP address: 128.143.137.144
Sent to 255.255.255.255
Server IP address: 128.143.137.100
Boot file name: filename

Argon
128.143.137.144
00:a0:24:71:e4:44 (c) DHCP Server

• BOOTP can be used for downloading


TFTP
“filename”
memory image for diskless workstations
• Assignment of IP addresses to hosts is static

128.143.137.100
•Automatic Private IP
Automatic Addressing (APIPA) is a feature
in operating systems (such as
Private IP Windows) that enables
computers to automatically self-
Addressin configure an IP address and
g (APIPA) subnet mask when their DHCP
server isn’t reachable. The IP
address range for APIPA
is 169.254.0.1-169.254.255.254,
with the subnet mask
of 255.255.0.0.
 Domain name is a way to identify and locate computers connected to internet

 No two organizations can have same domain name

 A domain name always consists of two or more components separated by


periods called dots (.)
EXAMPLE: www.yahoo.co.in, www.facebook.com etc.

 Once a domain has been established subdomains can be created within the
domain
EXAMPLE: The domain for the large company could be “Vni.com” and within this
domain subdomains can be created for each of the company’s regional office.
Eg: Bombay.vni.com
Last name.
subdomain.
second-
level
domain.
top-level
domain
EXAMPLE:
vijay.Bomba
y.vni.com
Top level domains a r e classifi ed into 3 categories:

 Organizational or generic domains

 Geographical or country domains

 R e v e rs e domains
 It consists of t h r ee character code which indicates the primary
function of the organization or their generic behavior
 Most commonly used top level domains are:

 .com for commercial organization eg www.y


 .net for networking organizations ahoo.com e g
 .gov for government organizations ewww.zedge.net
g
 .edu for educational organizations www.newjersey.gov
 .org for non-commercial organizations e g www.uducause.edu
eg www.eklav
 .mil for military organizations ya.org e g www.dod.mil
 .int for international organizations eg www.itu.int
It consists of two These codes have been
characters which standardized by
represents different International Standard
countries/regions all Organizational (ISO)
around the world • EXAMPLE:

 .in India
 .jp Japan
 .us United S tates
 .fr france
 .it Italy
 .cn China
 .au Australia
 Each domain name h a s a corresponding IP a d d re s s

 When th e u s e r t y p e s th e domain name in t h e a d d re s s bar,


th e corresponding IP a d d re s s is supplied. Such a
translation is possible with th e help of s y s t e m called DNS
(DOMAIN NAME SYSTEM)

 DEFINITION:

“DOMAIN NAME SYSTEM is a collection of t h e d a t a b a s e s


that contain information about domain n a m e s and their
corresponding IP address.”
How DNS Lookup
Works
DNS is the resolution of a
domain name to an IP address.
Moreover, for those of you who
are not aware of how it works
read on to learn the basics.

DNS Lookups
• Forward DNS Lookups
• Reverse DNS Lookups
NAS (Network
Attached Storage)
•A NAS system is a storage device
connected to a network that
allows storage and retrieval of
data from a centralized location
for authorized network users and
heterogeneous
clients. NAS systems are flexible
and scale-out, meaning that as
you need additional storage, you
can add on to what you have.
SAN (Storage
Area Network)
•A Storage Area Network (SAN) is a
specialized, high-
speed network that provides block-
level network access to storage.
SANs are typically composed of
hosts, switches, storage elements,
and storage devices that are
interconnected using a variety of
technologies, topologies, and
protocols.
15.
Routing
Protocols
Explained
INTER- AND INTRA-DOMAIN ROUTING

Today, an internet can be so large that one An autonomous system (AS) is a group of
routing protocol cannot handle the task of networks and routers under the authority of a
updating the routing tables of all routers. single administration. Routing inside an
autonomous system is called intra-domain routing.
For this reason, an internet is divided into
Routing between autonomous systems is called
autonomous systems. inter-domain routing
Popular routing protocols
DISTANCE VECTOR ROUTING

An autonomous system
(AS) is a group of
Today, an internet can be so large networks and routers
under the authority of a
that one routing protocol cannot single administration.
handle the task of updating the Routing inside an
routing tables of all routers. For autonomous system is
called intra-domain
this reason, an internet is divided routing. Routing
into autonomous systems. between autonomous
systems is called inter-
domain routing
RIP

•The Routing Information Protocol (RIP)


is an intra- domain (interior) routing
protocol used inside an autonomous
system.

•It is a very simple protocol based on


distance vector routing. RIP
implements distance vector routing
directly with some considerations.
Example of a domain using RIP
LINK STATE ROUTING

Link state routing has a different philosophy from that of distance


vector routing.

In link state routing, if each node in the domain has the entire topology of
the domain—the list of nodes and links, how they are connected
including the type, cost (metric), and the condition of the links (up or
down)—the node can use the algorithm to build a routing table.
Concept of Link state routing
OSPF

The Open Shortest Path First (OSPF) protocol is an intra-domain routing protocol based on
link state routing. Its domain is also an autonomous system.

Open Shortest Path First (OSPF) is a link-state routing protocol that is used to find the best
path between the source and the destination router using its own Shortest Path First).
Areas in an autonomous system
BGP

Border Gateway Protocol (BGP) is an BGP (Border Gateway Protocol) is


interdomain routing protocol using path the protocol underlying the
vector routing. It first appeared in global routing system of the internet. It
manages how packets get routed from
1989 and has gone through four
network to network through the exchange
versions. of routing and reachability information among
edge routers.
Internal and external BGP sessions
16. WAN
Technolog
y Fully
Explained
Let’s
Understand
What is
Internet or
WAN Network
Internet = WAN
17. Remote
Protocols &
Services
Remote Access Protocols

•In addition to an IP address, you need a


remote access protocol to connect to the
Internet. A remote access protocol is a
communications standard that allows your
computer to talk to the remote network. If
you ever intend to work from home, you
will appreciate this service. After all, it
enables telecommuting. There are three
common remote access protocols used
today: PPP, PPTP, and SLIP.
Serial Line Internet Protocol (SLIP)

•SLIP operates at both the Physical and Data Link


layers of the OSI model. Today, SLIP is found in
many network operating systems in addition to
UNIX. It is being used less frequently with each
passing year, though, because it lacks features
when compared with other protocols. Although a
low overhead is associated with using SLIP and you
can use it to transport TCP/IP over serial
connections, it does no error checking or packet
addressing and can be used only on serial
connections. SLIP is used today primarily to
connect a workstation to the Internet or to another
network running TCP/IP.
•PPP uses the Link Control
Point-to- Protocol (LCP) to communicate
Point between PPP client and host. LCP
tests the link between client and
Protocol PPP host and specifies PPP client
(PPP) configuration. Through LCP, PPP
also supports authentication
negotiation, as well as
negotiation of encryption and
compression between client and
server, using compression
control protocols (CCPs) and
encryption control protocols
(ECPs).
•To use PPTP, you set up a PPP
Point-to-Point session between the client and
Tunneling server, typically over the Internet.
Protocol (PPTP) Once the session is established, you
create a second dial-up session that
dials through the existing PPP
session using PPTP. The PPTP
session tunnels through the existing
PPP connection, creating a secure
session. In this way, you can use the
Internet to create a secure session
between the client and the server.
Also called a virtual private network
(VPN), this type of connection is
very inexpensive when compared
with a direct connection.
Windows •RAS is used in smaller
Remote Access networks where a
Services (RAS) dedicated dial-up router is
not practical or possible. In
a RAS setup, you can
basically connect a modem
to a Windows NT or
Windows 2000 server and,
by way of the RAS,
configure that modem as
dial-out only, dial-up only,
or a combination.
Remote •The Remote Desktop
Desktop Protocol (RDP) is very similar
Protocol (RDP) to the Independent
Computing Architecture (ICA)
protocol used by Citrix
products. As a matter of fact,
RDP is used to access
Windows Terminal Services,
a close relative of the Citrix
Win Frame product line. RDP
performs the same basic
functions as ICA, but it does
it with a lot less functionality.
18.
Networkin
g Tools &
Safety
Crimping Tool

•A crimping tool is a device used to conjoin two


pieces of metal by deforming one or both of
them to hold each other. The result of the
tool's work is called a crimp. An example of
crimping is affixing a connector to the end of a
cable. For instance, network cables and phone
cables are created using a crimping tool (shown
below) to join RJ-45 and RJ-11 connectors to
both ends of phone or Cat 5 cable
Network Cable
Tester
•One of the problems with wired networks is that
when they cease to work, troubleshooting may be a
little more difficult as compared to wireless networks.
This is where a network cable tester can help you. A
network cable tester is a useful device that allows you
to check the continuity of the cable to figure out if the
signal is strong enough to get through to the network.
This helps to eliminate cable connectivity issues while
troubleshooting the problems.
•The coaxial cable is the cable
that includes the outer metal
Coaxial that does the conducting. A
Compressio central conducting core ensures
n Tool that the metal is insulated. High
frequency signals are
transmitted through this coaxial
cable line. A coaxial compression
tool is a useful device that uses
connectors to properly compress
the coaxial cable. The side of the
cable wire will enable you to
know which type of cable it is.
Multimeter Tool

•A digital multimeter is a
test tool used to measure
two or more electrical
values—principally voltage
(volts), current (amps) and
resistance (ohms). It is a
standard diagnostic tool for
technicians in the
electrical/electronic
industries.
19. Network
Attacks
1. Malwares
2. Phishing
3. Man-In-the-Middle
Attack
4. DDoS Attack
5. Cross-Site Scripting
6. SQL Injection Attack
Firewall
•A firewall is a network security device, either hardware or software-based, which
monitors all incoming and outgoing traffic and based on a defined set of security rules it
accepts, rejects or drops that specific traffic.

•Accept : allow the traffic


Reject : block the traffic but reply with an “unreachable error”
Drop : block the traffic with no reply

•A firewall establishes a barrier between secured internal networks and outside


untrusted network, such as the Internet.
20. All
about
Network
Security
Let’s Talk Briefly
21. All About Cloud
Concepts
What is Cloud?
•The term Cloud refers to a Network or
Internet. In other words, we can say that
Cloud is something, which is present at
remote location.
•Cloud can provide services over
network, i.e., on public networks or
on private networks, i.e., WAN, LAN or
VPN.
•Applications such as e-mail, web
conferencing, customer relationship
management (CRM), all run in cloud.
What is Cloud
Computing?
•Cloud Computing refers to
manipulating, configuring, and
accessing the applications online.
•It offers online data storage,
infrastructure and application.

•Cloud Computing is both a combination


of software and hardware based
computing resources delivered as a
network service.
Cloud Computing
Architecture
Basic Concepts
•There are certain services and models
working behind the scene making the
cloud computing feasible and accessible to
end users. Following are the working
models for cloud computing:

• Deployment Models

• Service Models
Deployment
Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located?
Cloud can have any of the four types of access: Public, Private, Hybrid and Community.
•PRIVATE CLOUD : The Private Cloud allows systems
and services to be accessible within an organization.
It offers increased security because of its private
nature.
PUBLIC CLOUD : The
Public Cloud allows •COMMUNITY CLOUD : The Community Cloud
systems and services allows systems and services to be accessible by
group of organizations.
to be easily
accessible to the •HYBRID CLOUD : The Hybrid Cloud is mixture of
general public. Public public and private cloud. However, the critical
activities are performed using private cloud while
cloud may be less the non-critical activities are performed using
public cloud.
secure because of its
openness, e.g., e-mail.
•Service Models are the reference
models on which the Cloud Computing
is based. These can be categorized into
Service three basic service models as listed
below:
Models
1.Infrastructure as a Service (IaaS)

2. Platform as a Service (PaaS)

3. Software as a Service (SaaS)


Infrastructure as
a Service (IaaS)
•IaaS is the delivery of technology infrastructure as an
on demand scalable service.
•IaaS provides access to fundamental resources such
as physical machines, virtual machines, virtual
storage, etc.
• Usually billed based on usage
• Usually, multi tenant virtualized environment
•Can be coupled with Managed Services for OS and
application support
Platform as a
Service (PaaS)
•PaaS provides the runtime environment for
applications, development & deployment
tools, etc.

•PaaS provides all of the facilities required


to support the complete life cycle of building
and delivering web applications and services
entirely from the Internet.

•Typically applications must be developed with a


particular platform in mind

• Multi tenant environments


• Highly scalable multi tier architecture
Software as a Service
(SaaS)
SaaS model allows to use software applications as a service to end users.

SaaS is a software delivery methodology that provides licensed multi-tenant access


to software and its functions remotely as a Web-based service.

• Usually billed based on usage


• Usually multi tenant environment
• Highly scalable architecture
22. All
About IoT
Concepts
What is IoT?
• Uniquely Identifiable objects or
things( Things refer to anything living or
non living things with an unique
identity) communicate or transfer data
over a network without requiring
human-to-human or human-to-
computer interaction.
What is the IoT ?

 Many definitions /
examples:

Collect Visuali Smart


Devices /
Objects
Service Informati ze
on Data Contr
s ol
The most used communication
channels to communicate
objects to internet in the IoT

• WiFi
• Bluetooth
• Zigbee Wireless
• NFC
• WiFi direct
• Bluetooth Low Energy
Benefits of IoT

 Tracking behaviour for real-


time
 Enhanced situational
awareness
 Sensor-driven decision
analytics
 Process optimization
 Optimized resource
consumption
 Instantaneous control and
response in complex
autonomous systems
IoT Basics

 What does an IoT project need?

 Device(s) that can


communicate

 Applications

 Web

 Smartphone

 Users
Future?
23.
Configuring
a Switch (All
Knowledge)
Let’s
Configure
in Packet
Tracer
24. VLAN
explained
VLAN

En > show vlan > vlan database > vlan 2 name v1 > int f0/1 > switchport access vlan 2
25. User
authentic
ation
•1. API
•2. Authorization
•3. Authentication

1. PAP (Password Authentication


Protocol) - Simple
2. CHAP (Challenge Handshake
Protocol) – Handshake File
3. EAP (Extensible
Authentication Protocol) – Smart
Card
26.
Network
Policies
Network Security Policy
A network security policy is a formal document that outlines the principles, procedures
and guidelines to enforce, manage, monitor and maintain security on a computer
network. It is designed to ensure that the computer network is protected from any act or
process that can breach its security.
•Rules and legal procedures to access the network and to modify its characteristics.
•Governance and management over Web/Internet access
•Implementation of security procedures (access control) on network nodes and
devices
•Role/Privilege based policies, such as identifying authorized and unauthorized
services/processes any user can perform on the network
27.
Everything
about
Virtualizati
on
Virtualiz
ation
28.
Everything
about
SOHO
What is SOHO network

•SOHO networks are small


LANs (Local Area Networks). Typically, SOHO
networks consists of less than 10 computers.
Network service servers like DNS server, email
server, web server etc., are typically configured
outside SOHO network.
•A SOHO network can be a small wired
Ethernet LAN or made of both wired and
wireless computers.
What is SOHO
Routers
•A SOHO router is a broadband router built and
marketed for small offices and home offices. Since the
workload for these types of businesses is primarily on
the internet, they require a local area network (LAN),
which means their network hardware is structured
specifically for that purpose. A SOHO network can be
a mixed network of wired and wireless
computers. Since these types of networks are meant
for businesses, they may also include printers and
sometimes ​voice over IP (VoIP) and fax over IP
technology.
29.
Networking
Commands
UTILITIES
•1. PING
•2. TRACERT
•3. NSLOOKUP
•4. NETSH INTERFACE IPV4 SET ADDRESS
NAME=“” STATIC
•5. NETSH WLAN
30. Networking Issues &
Troubleshooting
What is Network
Troubleshooting ?
• Network troubleshooting is the collective
measures and processes used to identify,
diagnose and resolve problems and issues
within a computer network.
• It is a systematic process that aims to
resolve problems and restore normal
network operations within the network.
Adapter Resources : Basic network
troubleshootin
Verify that the network g
adapter is properly
installed and detected
by the computer with no
conflicts. If conflicts
exist or the network
adapter is being
detected as an "Other
device", the network
card has likely not been
properly installed in the
computer.
Verify connections
If this is a wired network, verify that the
network cable is properly connected and
make sure the LEDs next to the network jack
are properly illuminated. , a network card
with a solid green LED or light usually
indicates that the card is either connected or
receiving a signal. If the green light is flashing,
this is an indication of data being sent or
received. The picture to the right is an
example of a LAN port with two LED
indicators next to the RJ-45 port. If there are
no lights or the lights are orange or red, the
card may be bad, not connected properly
Wireless Network
:
If you're using a laptop with a wireless network, look for
the laptop's Wi-Fi button and make sure it is turned on.
Many laptops have a Wi-Fi button that allows the wireless
network to be turned on and off. The Wi-Fi button is often
located just above the keyboard or on the front edge of the
laptop, but it also may be integrated with a F key as well.

If the button is turned on, make sure you're using the


correct Wi-Fi hotspot by right-clicking on the Network icon
in the Windows Notification Area and clicking "Connect to
a network". Usually, the network with the strongest
connection (the most bars) will be your wireless router.
Adapter functionality:

• Verify that the network card is capable of pinging itself by using


the ping command. Windows users can ping the computer from
a Windows command line. Unix and Linux users can ping from
the shell.

ping 127.0.0.1

ping localhost
Firewall:

If your computer network


utilizes a firewall, make sure all
required ports are open, especially
port 80, which is the HTTP port. If
possible, disable the firewall
software or disconnect the
computer from the firewall to make
sure it is not causing the network
problems.
The Internet is not working
Turn off the power to the computer and leave it off.

Unplug the power cable to your router and cable modem or DSL modem.

Leave the power cables disconnected for 10-15 seconds, plug in your modem again, and then plug in your router again.

Finally, turn on your computer and see if you can ping your router.

If after following the above steps, the Internet is still not working, open the Windows command line and run the below
command.

ping google.com
Additional troubleshooting:
• Another method of determining network issues is to use the tracert
command if you are a Windows user or the traceroute command if
you are a Linux or Unix variant user. This command gives you an
overview of each of the devices (routers) a packet travels (hops)
over a network. It can also give you an idea of where a problem
exists in your network or outside of your network.

tracert google.com

traceroute google.com
•Question : A Network Cable Is Unplugged
•Answer : This message appears as a Windows
desktop balloon. Several different conditions can
SOME generate this error each with their own solution,
including bad cabling or issues with the device

PROBLEM drivers.
•If your connection is wired, you may lose access to
AND the network. If on wireless, your network will
probably function normally but this error message will

SOLUTION become an annoyance since it pops up repeatedly


until the issue is addressed.

PART :
•Answer : If a computer is set up with a static
Question : IP IP address that's being used by some other
device on the network, the computer (and
Address possibly also the other device) will be unable
to use the network.

Conflict •An example is


two or more
devices using the
(Address IP address
192.168.1.115.
Already in •In some cases,
this problem can
Use) even occur with
DHCP addressing.
Question : • Answer : Updating the TCP/IP
configuration can resolve this issue

The when trying to access another


device on the network.

Network • You might see it when using the incorrect


name for the network resource if the

Path Cannot share doesn't exist, if the times on the


two devices are different or if you don't
have the right permissions to access the
Be Found resource.
Question : Connected
with Limited Access
•Answer : A technical glitch in Windows can
cause this error message to appear when
making certain types of wireless
connections, which is why Microsoft
provided a fix for it in a service pack update
for Windows Vista systems.
•You might still find this error in other
versions of Windows too, though. It can
also occur on a home network for other
reasons that might require you to reset
your router or connect and then
disconnect from the wireless connection.

You might also like